quick and dirty proof-of-concept to hide shells in images
☆52Jun 27, 2024Updated last year
Alternatives and similar repositories for imgdevil
Users that are interested in imgdevil are comparing it to the libraries listed below
Sorting:
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆24Mar 18, 2023Updated 2 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- ☆20Mar 21, 2024Updated last year
- ☆36Apr 24, 2024Updated last year
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 2 years ago
- Active directory Attacks and Scripts☆27Sep 8, 2023Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 9 months ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- A simple utility to generate domain names with all possible TLDs☆23Feb 3, 2023Updated 3 years ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- This is a simple example of DLL hijacking enabling proxy execution.☆70Apr 18, 2023Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 3 months ago
- Find Email Spoofing Vulnerablity of domains☆96Jul 30, 2024Updated last year
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆368Apr 19, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- ☆10Jan 17, 2022Updated 4 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated last month
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Dec 8, 2022Updated 3 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Dec 20, 2023Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆78Dec 24, 2025Updated 2 months ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- Using LNK files and user input simulation to start processes under explorer.exe☆34Sep 21, 2024Updated last year
- ☆25Jan 11, 2023Updated 3 years ago
- A tool to combine a PDF and a JPG into one polyglot file which is both a PDF and JPG☆16Dec 8, 2019Updated 6 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year