Code released with Shmoocon Firetalks and Epilogue talks
☆45Jan 14, 2016Updated 10 years ago
Alternatives and similar repositories for shmoocon
Users that are interested in shmoocon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Real-time websocket stream of GPS events on a fancy SVG world map☆19Jan 5, 2022Updated 4 years ago
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- Automated Password Dumper for Web Browsers☆16Mar 23, 2014Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- Collection of Random PowerShell Scripts☆115Jun 2, 2014Updated 11 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- A powershell based traffic generation scripts to simulate user activity via Internet Explorer☆15May 6, 2015Updated 10 years ago
- Domain fronting using Google app engine☆53Feb 19, 2018Updated 8 years ago
- Listening Post for Throwback Implant☆111Jan 26, 2016Updated 10 years ago
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Python library for managing malware feeds and blacklists published online by third parties.☆10Nov 13, 2015Updated 10 years ago
- Convert an IOS/NXOS/ACE/ASA config file into basic HTML, creating links between commands referencing lists and that list (e.g. access lis…☆14May 23, 2018Updated 7 years ago
- Grow your own Christmas tree within R using tree architectural models☆13Dec 17, 2019Updated 6 years ago
- Plugin for keepnote to import a XML nmap file☆27Jul 8, 2016Updated 9 years ago
- Openstack made easy☆13Nov 28, 2017Updated 8 years ago
- a simple reverse connected bot in golang.☆17Jun 14, 2022Updated 3 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 10 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆10Oct 5, 2015Updated 10 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30May 20, 2021Updated 4 years ago
- ☆10Apr 11, 2020Updated 6 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 11 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated last year
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18May 14, 2020Updated 5 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago