Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
☆48Jul 18, 2024Updated last year
Alternatives and similar repositories for searchbins
Users that are interested in searchbins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Heramineta de analisis en red☆11Feb 13, 2023Updated 3 years ago
- ☆25Oct 31, 2024Updated last year
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 3 months ago
- Herramienta Python para obtener información de redes y explorar seguridad de redes.☆44Jun 29, 2024Updated last year
- Herramienta hecha totalmente en bash, creada para la automatización de mi configuración de bspwm, tomando como referencia el entorno de s…☆54Aug 9, 2025Updated 8 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- S4vitar's desktop enviroment automatic☆12Feb 9, 2023Updated 3 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- ☆16Jul 6, 2024Updated last year
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆11Aug 4, 2021Updated 4 years ago
- Keylogger hecho en python, donde recoge las pulsaciones del teclado y mediante sockets lo envía a una máquina atacante por el puerto 8080…☆33Dec 21, 2023Updated 2 years ago
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- A pure C version of SymProcAddress☆29Mar 17, 2024Updated 2 years ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 4 months ago
- Extracted lua script from Defender mpavbase.vdm and mpasbase.vdm☆16Jul 5, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Redirect All Traffic Through Tor Network For Kali Linux☆222Mar 26, 2025Updated last year
- Enlace donde voy a compartir un fichero de obsidian con la recopilación de todos mis apuntes de varias ramas de informática con los segui…☆371Oct 21, 2024Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- ☆43Feb 12, 2026Updated 2 months ago
- ☆36Nov 26, 2024Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 10 months ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Jul 12, 2025Updated 9 months ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆47Jan 10, 2024Updated 2 years ago
- ☆19Dec 7, 2024Updated last year
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆39Jan 3, 2026Updated 3 months ago
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- This is a program written in python which allows you to log in with different sql injections that allow you to bypass some login pages (F…☆12Feb 23, 2023Updated 3 years ago
- Bash script that automates the setup of a professional hacking environment for Kali Linux using the tiled window manager bspwm.☆512Jul 19, 2025Updated 9 months ago
- Hashcrypt es una herramienta criptográfica que permite cifrar un texto en 5 tipos de hash.☆10Feb 8, 2021Updated 5 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year
- ☆32Dec 10, 2024Updated last year
- ☆13Jun 22, 2023Updated 2 years ago
- Deploy a hacking environment with just one click!☆111Nov 5, 2023Updated 2 years ago
- Despliega un entorno de hacking profesional para Kali Linux ejecutando solo un script.☆107Aug 1, 2025Updated 8 months ago
- Professional bspwm desktop environment for kali linux for hacking, of all kinds, with custom shortcuts, scripts, s4vitar configurations, …☆211Mar 30, 2025Updated last year
- An all-in-one IDE for developing with Ducky Script and creating Flipper Zero apps☆21Oct 11, 2024Updated last year