r1vs3c / searchbinsView external linksLinks
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
☆47Jul 18, 2024Updated last year
Alternatives and similar repositories for searchbins
Users that are interested in searchbins are comparing it to the libraries listed below
Sorting:
- Heramineta de analisis en red☆11Feb 13, 2023Updated 3 years ago
- Poshito is a Windows C2 over Telegram☆18Oct 30, 2024Updated last year
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated last year
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- Yescrypt Hash Cracker☆14Jan 13, 2026Updated last month
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Jan 21, 2024Updated 2 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- S4vitar's desktop enviroment automatic☆12Feb 9, 2023Updated 3 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Jan 10, 2024Updated 2 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆17May 6, 2024Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 9 months ago
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 10 months ago
- Herramienta Python para obtener información de redes y explorar seguridad de redes.☆44Jun 29, 2024Updated last year
- Herramienta hecha totalmente en bash, creada para la automatización de mi configuración de bspwm, tomando como referencia el entorno de s…☆53Aug 9, 2025Updated 6 months ago
- Script que automatiza ciertas comprobaciones para escalar privilegios en Linux☆20Oct 23, 2024Updated last year
- ☆25Oct 31, 2024Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆26Aug 18, 2024Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆212Mar 26, 2025Updated 10 months ago
- Nim process hollowing loader☆62Jul 22, 2025Updated 6 months ago
- ☆22Jun 28, 2016Updated 9 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- ☆15Jul 6, 2024Updated last year
- ☆11Sep 26, 2021Updated 4 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 8 months ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Jul 12, 2025Updated 7 months ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Nov 4, 2024Updated last year
- Enlace donde voy a compartir un fichero de obsidian con la recopilación de todos mis apuntes de varias ramas de informática con los segui…☆360Oct 21, 2024Updated last year
- Bash script that automates the setup of a professional hacking environment for Kali Linux using the tiled window manager bspwm.☆499Jul 19, 2025Updated 6 months ago
- Professional AI Hacking Platform☆59Oct 29, 2025Updated 3 months ago
- ☆36Nov 26, 2024Updated last year
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- CRUD básico em PHP com um sistema de cadastro de clientes.☆13May 19, 2021Updated 4 years ago
- This is a program written in python which allows you to log in with different sql injections that allow you to bypass some login pages (F…☆12Feb 23, 2023Updated 2 years ago
- Security checks for your researches☆34Nov 22, 2020Updated 5 years ago
- A Bash script for scanning the local network to identify machines, retrieve their IP and MAC addresses, and determine the operating syste…☆40Mar 16, 2024Updated last year