s-w-1-t-c-h / dart_rsView external linksLinks
Basic Dart reverse shell code
☆21Nov 10, 2023Updated 2 years ago
Alternatives and similar repositories for dart_rs
Users that are interested in dart_rs are comparing it to the libraries listed below
Sorting:
- a simple backdoor in Nim☆19Aug 6, 2021Updated 4 years ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- POCs to test Vlang in cybersecurity aspects.☆37Dec 29, 2022Updated 3 years ago
- ☆24Jun 29, 2021Updated 4 years ago
- Automatic DNS Enumeration Tool with various functions☆13Sep 28, 2021Updated 4 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Vulnerable docker images for CVE-2021-41773☆22Oct 6, 2021Updated 4 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- eBPF-based EDR for Linux☆18Aug 25, 2024Updated last year
- a tool that facilitates eavesdropping and man-in-the-middle attacks☆16Mar 20, 2013Updated 12 years ago
- Icon file generator for Windows, macOS, Web☆15Oct 6, 2024Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- This project used to learn golang and try to bypass AV☆21Sep 20, 2021Updated 4 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- [OLD] Terraform provider plugin for Linode Cloud resources.. See☆15Oct 18, 2018Updated 7 years ago
- How to mix C and Go with cgo on Windows☆22Jul 30, 2017Updated 8 years ago
- Terminate the eventlog thread to disable the windows eventlog☆21Apr 1, 2020Updated 5 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆124Nov 14, 2022Updated 3 years ago
- NAT Slipstream attack code samples☆48Jun 28, 2021Updated 4 years ago
- A collection of offensive Nim example code☆74Dec 21, 2021Updated 4 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Jun 18, 2023Updated 2 years ago
- ARL Docker 环境分布式部署☆19Mar 23, 2021Updated 4 years ago
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆205Jul 2, 2017Updated 8 years ago
- Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.☆20Feb 2, 2022Updated 4 years ago
- CVE-2021-3560 Local PrivEsc Exploit☆82Jun 12, 2021Updated 4 years ago
- A Bayesian Method for the Induction of Probalistic Networks from Data☆19Jul 6, 2017Updated 8 years ago
- Microsoft Flow Attack Framework☆23Nov 14, 2019Updated 6 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- RCE Exploit for Gitlab < 13.9.4☆51Jun 4, 2021Updated 4 years ago
- Encrypt embedded go files using age.☆49Oct 21, 2021Updated 4 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Apr 20, 2021Updated 4 years ago
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to sea…☆135Dec 10, 2021Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Aug 6, 2021Updated 4 years ago
- 计算ip范围,支持 cidr,ip-range 格式的输入☆23Sep 5, 2023Updated 2 years ago
- ☆22Sep 10, 2021Updated 4 years ago
- Utilities to extract secrets from 1Password☆109Aug 17, 2021Updated 4 years ago