pH4Marketplace is a Fiverr Clone marketplace website build with Django (and Bootstrap for the frontend)
☆11Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for pH4Marketplace
Users that are interested in pH4Marketplace are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆12Oct 9, 2022Updated 3 years ago
- ☆12Sep 20, 2020Updated 5 years ago
- ☆10Oct 9, 2024Updated last year
- Stub for polymorphic code☆11Mar 18, 2023Updated 3 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆41Apr 7, 2025Updated 11 months ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- ☆10Jun 11, 2022Updated 3 years ago
- Here I store my proof of concepts☆14Sep 6, 2024Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- A library for quickly and easily encrypting strings and text file content.☆12Jul 1, 2021Updated 4 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 5 years ago
- ☆12Jun 27, 2019Updated 6 years ago
- A simple example on how to initiate a direct syscall on WoW64☆12Feb 2, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Feb 22, 2025Updated last year
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- ☆12Nov 22, 2024Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Jul 23, 2025Updated 8 months ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- php7.4.26-internalog☆13Oct 13, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Exploring different process injection techniques based on malware analysis☆14Dec 28, 2023Updated 2 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆18Updated this week
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 6 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago