Use md5-collisions to make evil executables looking like a good one.
☆34Apr 23, 2020Updated 5 years ago
Alternatives and similar repositories for evilize
Users that are interested in evilize are comparing it to the libraries listed below
Sorting:
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Generic Makefile Template with Automatic Dependency Generation☆12Aug 6, 2021Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- ☆14Jan 25, 2022Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Aug 22, 2021Updated 4 years ago
- ☆13Jan 22, 2025Updated last year
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Cobalt Strike Aggressor Script Collection☆19Mar 30, 2018Updated 7 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- ☆41Apr 4, 2021Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- A lot of endpoints for the HackTheBox API.☆15Jul 3, 2020Updated 5 years ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 8 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 2 months ago
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- Uncover the full name of a target on Linkedin.☆164May 27, 2022Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- Windows API/constants, identity, and WinHTTP/WinINet for Go.☆19Jan 13, 2026Updated last month
- AppContainerBypass☆21Apr 4, 2021Updated 4 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated last month
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- LinkedIn Scraper☆19Feb 23, 2020Updated 6 years ago
- MD5 collision testing☆17Nov 24, 2024Updated last year
- My challenges for AIS3 pre-exam 2019 and MyFirstCTF 2019☆21Jun 16, 2019Updated 6 years ago
- Less sugar (entropy) for your binaries☆34Sep 10, 2025Updated 5 months ago
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- Golang anti-vm framework for Red Team and Pentesters☆128Jun 22, 2023Updated 2 years ago
- Reverse shell using Windows Registry files (.reg)☆18Apr 7, 2020Updated 5 years ago