nu11secur1ty / w1f1t3kAl1View external linksLinks
w1f1t3kAl1
☆46Feb 16, 2024Updated 2 years ago
Alternatives and similar repositories for w1f1t3kAl1
Users that are interested in w1f1t3kAl1 are comparing it to the libraries listed below
Sorting:
- ☆11Feb 16, 2024Updated last year
- ☆34Mar 7, 2020Updated 5 years ago
- Another AMSI bypass - but in C++.☆24May 22, 2023Updated 2 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆10Jan 25, 2026Updated 3 weeks ago
- ☆10Feb 22, 2023Updated 2 years ago
- Opensource IPTV control panel☆28Oct 6, 2022Updated 3 years ago
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆14Sep 29, 2020Updated 5 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆16Oct 2, 2020Updated 5 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆22Jan 28, 2021Updated 5 years ago
- A super fast multithreaded ports scanner that scans for open listening ports on the target server with multiple methods and user-specifie…☆23May 28, 2021Updated 4 years ago
- Malicious DLL (Reverse Shell) generator for DLL Hijacking☆46Apr 10, 2020Updated 5 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Raven is a Web application penetration testing tool.☆17Jun 16, 2021Updated 4 years ago
- C++ Code Injector Class☆22Oct 2, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Tool to Disable User Lock☆25Nov 22, 2022Updated 3 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆109Apr 12, 2020Updated 5 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- A simple script to obfuscate batch(bat) code easily☆25Oct 21, 2023Updated 2 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆35Jul 12, 2021Updated 4 years ago
- Get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate-limit!)☆25Jun 3, 2020Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- This is Same as Burpsuite Collaborator | Free | Burpsuite Collaborator Server☆12Jun 27, 2025Updated 7 months ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Jul 27, 2022Updated 3 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Yet another Windows DLL injector.☆40Nov 17, 2021Updated 4 years ago
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- ☆27Sep 22, 2021Updated 4 years ago
- medium-rare☆28Nov 21, 2019Updated 6 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago