omrilotan / colombo
π΅οΈββοΈ View Javascript source code using source-map from CLI
β9Updated 5 months ago
Related projects β
Alternatives and complementary repositories for colombo
- Windows privilege escalation Mafia is a framework provides all resources needed for privilege escalation beginnersβ12Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research teaβ¦β18Updated 3 years ago
- ZTE F660 Routers Authentication Bypass Leading to RCE.β16Updated 8 months ago
- Sniff HTTP requests making by XHR in the browser or HTTP module in Node.jsβ12Updated 2 weeks ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.β8Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognitionβ13Updated 2 years ago
- JALSI - Just Another Lame Shellcode Injectorβ30Updated 3 years ago
- Host IDS for desktop usersβ11Updated 3 years ago
- Code for the "Hiding Data In Sound" videoβ10Updated last year
- β8Updated 4 years ago
- Python support package to parse IP and host inputs from network based toolingβ11Updated last year
- A PE morphing tool that allows you to mimic one executable file to another.β11Updated 11 months ago
- Vuln-dev environment for LuaJITβ16Updated last year
- My nim learning experimentsβ11Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)β20Updated last year
- Silent Screenshot Capture | Post Exploitation Payload | VB.NETβ11Updated 4 years ago
- β12Updated 3 years ago
- x86 Assembly Code Examples for Blog Postsβ15Updated 2 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)β11Updated 7 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.β12Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitationβ19Updated 4 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Pβ¦β15Updated 2 years ago
- CVE-2020-0688β10Updated 4 years ago
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.β16Updated 3 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)β26Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)β17Updated 4 years ago
- β11Updated 4 years ago