petikvx / ELFMalwaresLinks
Some ELF Malwares
☆9Updated 3 years ago
Alternatives and similar repositories for ELFMalwares
Users that are interested in ELFMalwares are comparing it to the libraries listed below
Sorting:
- ☆18Updated 2 years ago
- Sources Codes of many Office Malwares☆17Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Yet another powerful payload encoder/decoder☆13Updated 3 years ago
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆12Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Random Tips and Writeups.☆13Updated 6 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- A C# Tool to gather information about email breaches☆14Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- 「🚪」The hidden hookless backdoor☆12Updated 6 months ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago
- Free Email Providers☆10Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 2 months ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Updated 3 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆24Updated 10 months ago
- Sources Codes of many MSIL malwares☆23Updated 2 years ago