Use md5-collisions to make evil executables looking like a good one.
☆34Apr 23, 2020Updated 6 years ago
Alternatives and similar repositories for evilize
Users that are interested in evilize are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆14Jan 10, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆14Jan 25, 2022Updated 4 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- Example Python code for creating a Bitcoin transaction☆15Jan 25, 2014Updated 12 years ago
- Code for the solutions of practical reverse engineering☆23Jan 17, 2020Updated 6 years ago
- Exchangelib wrapper for pentesting☆68Feb 17, 2025Updated last year
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Cobalt Strike teamserver detection.☆16Apr 26, 2021Updated 5 years ago
- Python Script to Parse Phone # and E-mails from Websites☆10Mar 23, 2022Updated 4 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Remove Offensive and Profane Words from Wordlists☆16Jul 27, 2023Updated 2 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Dec 7, 2022Updated 3 years ago
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆17Nov 12, 2024Updated last year
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- .NET implementation of Cobalt Strike's External C2 Spec☆89Nov 12, 2021Updated 4 years ago
- Generic Makefile Template with Automatic Dependency Generation☆13Aug 6, 2021Updated 4 years ago
- Wireless penetration testing framework. Automates WPA/WPA2/WEP/WPS attacks - recon to exploitation in one command. aircrack-ng + hashcat …☆32Apr 10, 2026Updated 2 weeks ago
- A simple very little blockchain, just for learning.☆27Dec 2, 2019Updated 6 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- Use NAT to reroute an applications UDP traffic for MITM purposes.☆11Sep 30, 2019Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆77Nov 19, 2024Updated last year
- 以子域名作为基础数据进行分析出关键词,然后基于FoFa、Shodan、Zoomye网络引擎的多维度资产探测脚本☆21Apr 25, 2021Updated 5 years ago
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AppContainerBypass☆21Apr 4, 2021Updated 5 years ago
- A Nmap script optimized for Hack the Box and CTFs☆15Feb 22, 2021Updated 5 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 4 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆26May 1, 2022Updated 3 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated 3 months ago