Windows GPU rootkit PoC by Team Jellyfish
☆22Jul 2, 2015Updated 10 years ago
Alternatives and similar repositories for WIN_JELLY
Users that are interested in WIN_JELLY are comparing it to the libraries listed below
Sorting:
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Oct 6, 2020Updated 5 years ago
- Experimental Little Kernel Android Bootloader for selected Lumia devices☆24Jun 25, 2019Updated 6 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23May 24, 2020Updated 5 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- ☆38Apr 15, 2025Updated 10 months ago
- Easy teamspeak automation☆10Apr 19, 2023Updated 2 years ago
- RS-485 module with 10 I/O multi-function☆10May 6, 2022Updated 3 years ago
- ☆38Feb 26, 2025Updated last year
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Scripts PowerShell pour configurer Windows☆14May 16, 2025Updated 9 months ago
- Deflate64 - Decripting Base 64 strings, decompress content (sploits Power Shell)☆10Oct 30, 2017Updated 8 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- Interact with Windows RPC Services over SMB using go-smb☆11Updated this week
- Zabbix template for monitoring ISP speeds using an external check script against speedtest.net☆11Oct 12, 2022Updated 3 years ago
- ☆10Dec 12, 2021Updated 4 years ago
- Tiniest ELF (Executable and Linkable Format) executable☆14Aug 27, 2018Updated 7 years ago
- This course is published by Packt Publishing☆22Aug 2, 2023Updated 2 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- 一个用于检测HOST 头攻击漏洞的Burp Suite扩展插件。☆13Mar 7, 2025Updated 11 months ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 2 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Aug 13, 2016Updated 9 years ago
- Wie man die Libre 2 Werte kontinuierlich auf einem Smartphone ohne NFC bekommt.☆13Feb 29, 2020Updated 6 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆11May 29, 2019Updated 6 years ago
- 对原版JNDIExploit进行修改增加线程和JMX注入内存马☆17Apr 23, 2025Updated 10 months ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆17May 10, 2024Updated last year
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- ☆14May 5, 2023Updated 2 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- Import and export x64dbg comments/breakpoints/labels/bookmarks in Cutter☆16Apr 2, 2021Updated 4 years ago