Use md5-collisions to make evil executables looking like a good one.
☆34Apr 23, 2020Updated 5 years ago
Alternatives and similar repositories for evilize
Users that are interested in evilize are comparing it to the libraries listed below
Sorting:
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Aug 22, 2021Updated 4 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆14Jan 10, 2020Updated 6 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Aug 10, 2016Updated 9 years ago
- ☆14Jan 25, 2022Updated 4 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- Example Python code for creating a Bitcoin transaction☆15Jan 25, 2014Updated 12 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Python Script to Parse Phone # and E-mails from Websites☆10Mar 23, 2022Updated 3 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 10 months ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Dec 7, 2022Updated 3 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆89Nov 12, 2021Updated 4 years ago
- Scripts to extract files from SCM directories left on web servers☆36Jun 19, 2023Updated 2 years ago
- XSSInspector can defeat any WAF in the world with its AI and 96 filter set. This open-source solution simplifies XSS vulnerability identi…☆12Sep 8, 2025Updated 6 months ago
- Generic Makefile Template with Automatic Dependency Generation☆12Aug 6, 2021Updated 4 years ago
- Main repository hosting the main AR software developed for Augmented Carpentry rersearch at Ibois, Epfl.☆15Feb 17, 2026Updated last month
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆15Apr 21, 2025Updated 10 months ago
- Automated multimedia storytelling using advanced AI models. Create rich narratives, stunning visuals, voiceovers, and videos effortlessly…☆11Oct 9, 2024Updated last year
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- 以子域名作为基础数据进行分析出关键词,然后基于FoFa、Shodan、Zoomye网络引擎的多维度资产探测脚本☆21Apr 25, 2021Updated 4 years ago
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- AppContainerBypass☆21Apr 4, 2021Updated 4 years ago
- A Nmap script optimized for Hack the Box and CTFs☆14Feb 22, 2021Updated 5 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 3 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- OpenSCAD script for generating pipe fitting automatically.☆19Mar 9, 2025Updated last year
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year