mindcrypt / polyglot
A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, steganography, red team)
☆104Updated 4 years ago
Alternatives and similar repositories for polyglot:
Users that are interested in polyglot are comparing it to the libraries listed below
- esoteric☆52Updated 4 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- A spiky Australian bug hunter☆29Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- ☆183Updated last year
- Get GTFOBins info about a given exploit from the command line☆39Updated 8 months ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆171Updated 5 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆61Updated 4 years ago
- A Python API for Hack the Box platform interaction☆64Updated 4 years ago
- ☆104Updated 2 years ago
- BloodHound Docker Ready to Use☆90Updated last year
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Updated 3 years ago
- A curated list of resources for the OSED journey.☆62Updated 3 years ago
- Github Scraper For Static Code Analysis☆58Updated 6 months ago
- CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef☆232Updated last week
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- Windows Kernel Exploits☆66Updated 7 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- Posts about different topics☆36Updated last year
- Repository to index useful tools for CTF's☆26Updated this week
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆111Updated last year
- BurpSuite using the document and some extensions☆68Updated 4 years ago
- ☆47Updated 8 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆277Updated last year
- Proof of Concept for CVE-2019-18634☆211Updated 3 years ago
- ☆62Updated 4 years ago