nillkitty / SKXView external linksLinks
An open-source .NET remake of the NES version of Solomon's Key with new features, new levels, and an integrated level editor
☆22Aug 18, 2021Updated 4 years ago
Alternatives and similar repositories for SKX
Users that are interested in SKX are comparing it to the libraries listed below
Sorting:
- ☆13May 27, 2020Updated 5 years ago
- Splunk scripted input for opening a backconnect shell on a remote forwarder☆45Nov 18, 2020Updated 5 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- Marlin Simulator UI☆15Dec 1, 2025Updated 2 months ago
- Repo to store Windows PE's and Utilities for easy access.☆16May 11, 2021Updated 4 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- my knowledge of linux privilege escalation☆10Oct 14, 2023Updated 2 years ago
- Inject code into .net applications☆12Nov 7, 2018Updated 7 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Zeek script library for getting the effective TLD of a domain.☆14Apr 12, 2024Updated last year
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 7 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- ☆11Oct 24, 2022Updated 3 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- An authentication termination SSH proxy.☆13Sep 8, 2023Updated 2 years ago
- Using censys to find subdomains but without the APIs just scrapping☆16May 13, 2020Updated 5 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Configure Azure Privileged Identity Management Via The API☆16Oct 28, 2022Updated 3 years ago
- ☆13Jul 30, 2021Updated 4 years ago