An example command dropper in rust.
☆13Jun 8, 2018Updated 7 years ago
Alternatives and similar repositories for injektilo
Users that are interested in injektilo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scans an internal network using massscan and nmap☆19Nov 21, 2025Updated 5 months ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- CarolinaCon13 Badge Jank☆16May 29, 2017Updated 8 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Invisible Watermarks with Space Characters in ASCII Files☆21Jun 14, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 10 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- A more obfuscated CactusTorch targeted towards office☆31Feb 4, 2021Updated 5 years ago
- Malware.lu tools☆65Oct 28, 2013Updated 12 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Handy batch scripts (Malicous and not malicous)☆16May 3, 2020Updated 6 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆33Apr 20, 2018Updated 8 years ago
- A simple Pastebin crawler with custom regex support and configurable parameters☆18Jul 14, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ListT done right☆15Oct 11, 2023Updated 2 years ago
- Implementation of Haskell CRDTs (Commutative Replicated Data Types)☆13Mar 5, 2012Updated 14 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 5 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- 3D version of snake☆16Sep 5, 2017Updated 8 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆88Jul 19, 2018Updated 7 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Concurrent bulk transfer of keys from one redis server to another. Written in Go / GoLang.☆13Mar 20, 2021Updated 5 years ago
- ☆23Dec 16, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- introduction to distributed scanning using vultr☆11Apr 29, 2017Updated 9 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- scraps and bits and bobs☆13Jul 28, 2022Updated 3 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆11Mar 22, 2018Updated 8 years ago
- A simple demo getting JMX metrics from a docker container☆12Feb 3, 2016Updated 10 years ago
- GHCJS runtime system and JavaScript support code for packages - deprecated as of GHC 8.2☆20Jun 10, 2019Updated 6 years ago
- HTTP tunnel on top of aiohttp and asyncio☆33Jul 7, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A simple script for keeping a file encrypted but still editing it. A common use is for managing a file containing passwords.☆20Mar 6, 2014Updated 12 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- A Clojure DSL for math and numerical work☆12Feb 15, 2016Updated 10 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆18Aug 9, 2024Updated last year
- Create dynamic HTML easy in the browser using declarative notation☆21Aug 28, 2020Updated 5 years ago
- ☆16May 6, 2015Updated 11 years ago