nyxgeek / imgdevilLinks
quick and dirty proof-of-concept to hide shells in images
☆50Updated 11 months ago
Alternatives and similar repositories for imgdevil
Users that are interested in imgdevil are comparing it to the libraries listed below
Sorting:
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- A Moodle Scanner☆42Updated 6 months ago
- ☆35Updated 6 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆51Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 6 months ago
- A small red team course☆39Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 6 months ago
- Azure Service Subdomain Enumeration☆60Updated 9 months ago
- ☆72Updated last year
- Situational Awareness script to identify how and where to run implants☆49Updated 5 months ago
- Cobalt Strike BOFS☆16Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 2 months ago
- Repo for all my exploits/PoCs☆50Updated 3 weeks ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 4 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- Inject RDPThief into memory with PowerShell.☆64Updated 4 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- Discord C2 Profile for Mythic☆29Updated 3 months ago
- ☆56Updated 6 months ago
- ☆90Updated this week
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆21Updated 9 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated last year