A tool to generate malicious .deb files
☆18Mar 6, 2018Updated 8 years ago
Alternatives and similar repositories for Derbie
Users that are interested in Derbie are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Check if a IP is from tor or is a malicious proxy☆57Feb 9, 2021Updated 5 years ago
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- Python based Office Macro Generator. Also does rudamentary obfuscation.☆12Jun 6, 2016Updated 9 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- BurpSuite Extension Ruby Template to speed up building a Burp Extension using Ruby☆30Feb 13, 2017Updated 9 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- System Security Project☆13Feb 28, 2017Updated 9 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Aug 10, 2016Updated 9 years ago
- Secure credential storage☆32Jun 13, 2015Updated 10 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- Modula-2 Preprocessor☆12Jun 14, 2021Updated 4 years ago
- Pentest TeamCity using Metasploit☆45Feb 8, 2021Updated 5 years ago
- WHMCS addon for OnePortal☆10Apr 29, 2022Updated 3 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- Register-based VM as C library☆11Feb 13, 2016Updated 10 years ago
- ☆13Feb 9, 2024Updated 2 years ago
- ☆14Feb 12, 2026Updated last month
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Telegram bot utilizing OpenAI's GPT to generate presentations and abstracts in PPTX and DOCX formats.☆10Jan 10, 2024Updated 2 years ago
- libcodecs is part of the "Huorong eXtendible Stream Scan Engine" project copyright by Huorong Borui (Beijing) Technology Co., Ltd.☆24Aug 17, 2015Updated 10 years ago
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 11 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- ☆11Feb 21, 2016Updated 10 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- Ansible role to set up dns in Debian-like systems☆10Jan 28, 2026Updated last month
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Modula-2 to C# Translator and Compiler☆14Jun 5, 2023Updated 2 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Nov 10, 2018Updated 7 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- Create a lnk shortcut file for Windows☆24Apr 23, 2019Updated 6 years ago
- UAVCAN is a lightweight protocol designed for reliable communication in aerospace and robotic applications via CAN bus.☆13Oct 16, 2024Updated last year
- ☆19Dec 8, 2014Updated 11 years ago
- ☆16Jun 21, 2016Updated 9 years ago
- Collection of Modula-2 Libraries☆19Sep 11, 2018Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50May 15, 2018Updated 7 years ago