netspooky / b64muteLinks
Base64 Mutator
☆13Updated 4 years ago
Alternatives and similar repositories for b64mute
Users that are interested in b64mute are comparing it to the libraries listed below
Sorting:
- Rosie the Pivoter☆17Updated 6 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- various slides and presentations I've worked on☆19Updated 4 months ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Fake SMB and SAMR data☆11Updated 5 years ago
- Network Finger Printer☆16Updated 7 years ago
- ☆11Updated 6 years ago
- Provides access to libhashcat☆30Updated last year
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- DNS server for pentesters☆49Updated 3 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- ☆22Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- The Cloud Blocker☆107Updated 5 months ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Change up a binary's embedded resources with this little creature.☆34Updated 5 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago