A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, steganography, red team)
☆118Mar 18, 2021Updated 5 years ago
Alternatives and similar repositories for polyglot
Users that are interested in polyglot are comparing it to the libraries listed below
Sorting:
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆180Apr 25, 2020Updated 5 years ago
- An `LD_PRELOAD` hack to make arbitrary programs work with systemd socket activation☆20Nov 14, 2025Updated 4 months ago
- ☆18Updated this week
- Exploiting XSS with Javascript/JPEG Polyglot (by @medusa_0xf)☆21Apr 8, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- VBA Macro obfuscator☆13Sep 20, 2020Updated 5 years ago
- A very simple way to try Suricata and EveBox☆15Feb 17, 2025Updated last year
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆42Apr 25, 2024Updated last year
- 「💀」Proof of concept on BYOVD attack☆166Dec 7, 2024Updated last year
- ☆20Mar 9, 2021Updated 5 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆51Dec 7, 2025Updated 3 months ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- 「🛡️」AVs/EDRs Evasion tool☆103Dec 7, 2024Updated last year
- ☆39Sep 25, 2023Updated 2 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆34Aug 22, 2018Updated 7 years ago
- PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282☆53May 27, 2024Updated last year
- Windows Sovereignty Tool & Recall Mitigation Agent.☆27Dec 19, 2025Updated 3 months ago
- Templtor is a bash script that will gather all the community Nuclei templates.☆30Dec 19, 2025Updated 3 months ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 5 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 3 years ago
- PowerShell Module to provide Network Block Device like functionality on Windows Hosts☆13Sep 27, 2015Updated 10 years ago
- ☆10Jul 3, 2021Updated 4 years ago
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Jul 16, 2024Updated last year
- Create polyglots for different file types☆19Jan 15, 2024Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Solutions from multiple CTFs we have played.☆11Oct 16, 2018Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago