Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
☆48Jul 18, 2024Updated last year
Alternatives and similar repositories for searchbins
Users that are interested in searchbins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Heramineta de analisis en red☆11Feb 13, 2023Updated 3 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 3 months ago
- Script que automatiza ciertas comprobaciones para escalar privilegios en Linux☆20Oct 23, 2024Updated last year
- S4vitar's desktop enviroment automatic☆12Feb 9, 2023Updated 3 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆16Jul 6, 2024Updated last year
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆11Aug 4, 2021Updated 4 years ago
- Keylogger hecho en python, donde recoge las pulsaciones del teclado y mediante sockets lo envía a una máquina atacante por el puerto 8080…☆33Dec 21, 2023Updated 2 years ago
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated 2 years ago
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- Python exploit for vsftpd 2.3.4 - Backdoor Command Execution☆16Jan 8, 2023Updated 3 years ago
- A pure C version of SymProcAddress☆29Mar 17, 2024Updated 2 years ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Extracted lua script from Defender mpavbase.vdm and mpasbase.vdm☆16Jul 5, 2024Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆222Mar 26, 2025Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- ☆43Feb 12, 2026Updated 2 months ago
- ☆36Nov 26, 2024Updated last year
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- XSS-Checker is a tool used to Check / Validate for XSS vulnerabilities☆18Dec 1, 2022Updated 3 years ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆47Jan 10, 2024Updated 2 years ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆39Jan 3, 2026Updated 3 months ago
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- This is a program written in python which allows you to log in with different sql injections that allow you to bypass some login pages (F…☆12Feb 23, 2023Updated 3 years ago
- Hashcrypt es una herramienta criptográfica que permite cifrar un texto en 5 tipos de hash.☆10Feb 8, 2021Updated 5 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 3 years ago
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- ☆13Jun 22, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Deploy a hacking environment with just one click!☆111Nov 5, 2023Updated 2 years ago
- Despliega un entorno de hacking profesional para Kali Linux ejecutando solo un script.☆107Aug 1, 2025Updated 8 months ago
- Professional bspwm desktop environment for kali linux for hacking, of all kinds, with custom shortcuts, scripts, s4vitar configurations, …☆213Mar 30, 2025Updated last year
- An all-in-one IDE for developing with Ducky Script and creating Flipper Zero apps☆21Oct 11, 2024Updated last year
- Herramienta donde puedes practicar las vulnerabilidades web más conocidas. Email: info@webvulnlab.org☆61Sep 22, 2025Updated 6 months ago
- ☆19Sep 4, 2024Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year