mindcrypt / bipolar
Creating attacks based on polyglot files. This tool (experimental) is useful in offensive security (stego malware, privilege escalation, lateral movement, ...). I recommend you to understand the source code to adapt to specific payloads or targets
☆9Updated 5 years ago
Alternatives and similar repositories for bipolar:
Users that are interested in bipolar are comparing it to the libraries listed below
- ☆24Updated 2 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- Simple Live Data Collection Tool☆21Updated 4 years ago
- ☆12Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Automated Payload Test Controller☆9Updated 7 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- ☆18Updated 4 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- ☆22Updated 4 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 11 months ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 4 months ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- visually see issues with supported cipher suites☆16Updated 10 months ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago