octopwn / wsnetView external linksLinks
wsnet
☆26Sep 24, 2025Updated 4 months ago
Alternatives and similar repositories for wsnet
Users that are interested in wsnet are comparing it to the libraries listed below
Sorting:
- ☆18Feb 1, 2026Updated 2 weeks ago
- Encodes a payload within a generated mock-CSS file☆59Sep 18, 2023Updated 2 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 10 months ago
- ☆12Jan 7, 2025Updated last year
- A logging ASKPASS binary☆29May 29, 2020Updated 5 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- Copy of Subtee's Repository That's Taken Down☆23Nov 2, 2017Updated 8 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆21Jan 19, 2015Updated 11 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Google Meet Phishing Template For Gophish☆48Aug 3, 2022Updated 3 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- Malware traffic obfuscation library☆39Jul 24, 2025Updated 6 months ago
- Create a lnk shortcut file for Windows☆24Apr 23, 2019Updated 6 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Registry hive parsing the async way☆25Oct 29, 2025Updated 3 months ago
- ☆55Apr 25, 2023Updated 2 years ago
- ☆19May 31, 2017Updated 8 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- A simple wrapper for l2ping which shows rssi☆20Oct 13, 2020Updated 5 years ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆27Jul 21, 2023Updated 2 years ago
- Future version of the AnyBody Managed Model Repository with a full thoracic spine model.☆18Feb 2, 2026Updated 2 weeks ago
- hatsApp Message Sender is a simple Python application that allows users to send WhatsApp messages programmatically using the pywhatkit li…☆14Nov 17, 2023Updated 2 years ago