Still point in moving world.
☆49Oct 6, 2022Updated 3 years ago
Alternatives and similar repositories for seacrane
Users that are interested in seacrane are comparing it to the libraries listed below
Sorting:
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- ☆28Mar 31, 2023Updated 2 years ago
- ☆31Mar 21, 2023Updated 2 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- ☆29May 19, 2023Updated 2 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 10 months ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆28Nov 15, 2020Updated 5 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆14Nov 30, 2021Updated 4 years ago
- Setup DevTerm to be a cool non-GUI device☆14Jun 3, 2024Updated last year
- A super super fast waveform visualizer for very very big traces☆29Feb 19, 2026Updated 2 weeks ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Reasonably undetected shellcode stager and executer.☆35May 23, 2025Updated 9 months ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- HTTP Requests for security researchers☆64Jul 3, 2023Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- ☆20Mar 21, 2024Updated last year
- ☆12Nov 21, 2023Updated 2 years ago
- Windows file metadata / forensic tool.☆18Oct 12, 2025Updated 4 months ago
- A go-exploit to scan for implanted Cisco IOS XE Systems☆41Oct 28, 2024Updated last year
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- Detection rule validation☆40Oct 25, 2023Updated 2 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 9 months ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆77Oct 24, 2022Updated 3 years ago
- compile-time control flow obfuscation using mba☆199Jul 4, 2023Updated 2 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago