Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
☆48Jul 18, 2024Updated last year
Alternatives and similar repositories for searchbins
Users that are interested in searchbins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Heramineta de analisis en red☆11Feb 13, 2023Updated 3 years ago
- ☆25Oct 31, 2024Updated last year
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 2 months ago
- Herramienta hecha totalmente en bash, creada para la automatización de mi configuración de bspwm, tomando como referencia el entorno de s…☆54Aug 9, 2025Updated 7 months ago
- S4vitar's desktop enviroment automatic☆12Feb 9, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Keylogger hecho en python, donde recoge las pulsaciones del teclado y mediante sockets lo envía a una máquina atacante por el puerto 8080…☆33Dec 21, 2023Updated 2 years ago
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated 2 years ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 3 months ago
- Extracted lua script from Defender mpavbase.vdm and mpasbase.vdm☆16Jul 5, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Redirect All Traffic Through Tor Network For Kali Linux☆222Mar 26, 2025Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- ☆41Feb 12, 2026Updated last month
- ☆36Nov 26, 2024Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 10 months ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Jul 12, 2025Updated 8 months ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆45Jan 10, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆38Jan 3, 2026Updated 2 months ago
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- Bash script that automates the setup of a professional hacking environment for Kali Linux using the tiled window manager bspwm.☆507Jul 19, 2025Updated 8 months ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 11 months ago
- ☆33Dec 10, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Deploy a hacking environment with just one click!☆110Nov 5, 2023Updated 2 years ago
- Despliega un entorno de hacking profesional para Kali Linux ejecutando solo un script.☆105Aug 1, 2025Updated 7 months ago
- Herramienta automatizada para enviar correos con phising.☆16Jul 29, 2020Updated 5 years ago
- Professional bspwm desktop environment for kali linux for hacking, of all kinds, with custom shortcuts, scripts, s4vitar configurations, …☆211Mar 30, 2025Updated 11 months ago
- An all-in-one IDE for developing with Ducky Script and creating Flipper Zero apps☆20Oct 11, 2024Updated last year
- "Collection of IoT vulnerability research and exploits, focusing on unauthorized access, CVEs, and popular devices like TP-LINK, Tenda, D…☆21Jan 20, 2025Updated last year
- ☆19Sep 4, 2024Updated last year