A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, steganography, red team)
☆121Mar 18, 2021Updated 5 years ago
Alternatives and similar repositories for polyglot
Users that are interested in polyglot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An `LD_PRELOAD` hack to make arbitrary programs work with systemd socket activation☆21Nov 14, 2025Updated 6 months ago
- A tool to combine a PDF and a JPG into one polyglot file which is both a PDF and JPG☆16Dec 8, 2019Updated 6 years ago
- ☆24May 8, 2026Updated last week
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- Exploiting XSS with Javascript/JPEG Polyglot (by @medusa_0xf)☆21Apr 8, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Attack Active Directory Trusts with a single tool☆13Jan 15, 2025Updated last year
- ☆12Apr 14, 2017Updated 9 years ago
- ☆24Oct 30, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- ☆11Apr 18, 2022Updated 4 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 4 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆20Mar 9, 2021Updated 5 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 7 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- European Cyber Security Challenge Gameboard☆29Feb 20, 2022Updated 4 years ago
- ☆39Sep 25, 2023Updated 2 years ago
- ☠️ Python script and example file to test the Right-To-Left Override attack☆10Feb 25, 2019Updated 7 years ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆52Dec 7, 2025Updated 5 months ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Quick test for CVE-2023-26025 behaviours☆13Nov 29, 2023Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Jan 12, 2024Updated 2 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 3 years ago
- PowerShell Module to provide Network Block Device like functionality on Windows Hosts☆13Sep 27, 2015Updated 10 years ago
- Create polyglots for different file types☆19Jan 15, 2024Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆54May 21, 2020Updated 5 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Parse Microsoft shim databases☆32Apr 26, 2026Updated 3 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆140Mar 19, 2024Updated 2 years ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆1,004Nov 6, 2024Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- Asynchronous NFSv3 client in pure Python☆30Jul 16, 2025Updated 10 months ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Jun 20, 2019Updated 6 years ago
- OWASP ThreatAtlas is a collaborative platform for community-driven threat modeling.☆63May 10, 2026Updated last week