rvrsh3ll / Phunter
Phunter is an osint tool allowing you to find various information via a phone number 🔎📞
☆14Updated 5 months ago
Related projects: ⓘ
- ☆24Updated 10 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆18Updated 7 months ago
- ☆28Updated last year
- ECC Public Key Cryptography☆33Updated 10 months ago
- Repo for all my exploits/PoCs☆28Updated last week
- Extension functionality for the NightHawk operator client☆26Updated 10 months ago
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆19Updated last year
- ☆35Updated 9 months ago
- Lena's scripts/code/resources for malware analysis☆16Updated 3 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆42Updated last year
- PowerShell script to generate ShellCode in various formats☆22Updated 2 weeks ago
- Yet Another Memory Analyzer for malware detection☆24Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- Cobalt Strike BOFS☆16Updated 9 months ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- ☆50Updated 5 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆33Updated 6 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆63Updated 4 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 2 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆35Updated 7 months ago
- ☆20Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆25Updated 6 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆12Updated last month
- ☆19Updated this week
- Tool for obtaining information about PPL processes☆14Updated 7 months ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su …☆36Updated 10 months ago