mrpapercut / nonalpha-js-obfuscator
Non-Alphanumeric JS Obfuscator
☆13Updated 8 years ago
Alternatives and similar repositories for nonalpha-js-obfuscator:
Users that are interested in nonalpha-js-obfuscator are comparing it to the libraries listed below
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- ☆10Updated 7 years ago
- A Unix rootkit☆16Updated 4 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- module for certexfil☆15Updated 2 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆10Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Zerokit shared code☆16Updated 6 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Awesome little automater☆17Updated 12 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 9 months ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Evil snippets of Underhanded Red Team tactics☆11Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 8 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Rootkit Arsenal 2nd Source Code☆14Updated 11 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago