testing123
☆14Nov 23, 2024Updated last year
Alternatives and similar repositories for misc-bin
Users that are interested in misc-bin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆24Mar 3, 2020Updated 6 years ago
- ☆43Aug 1, 2019Updated 6 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- all published scripts devloped by ahmed khlief☆20Apr 3, 2020Updated 6 years ago
- Discover TimeDateStamps In PE File☆17Dec 12, 2015Updated 10 years ago
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 6 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Openvpn client in a docker container.☆11Nov 5, 2024Updated last year
- This app leverages the Adaptive Response framework to search against the intezer analyze APIs☆17Aug 27, 2019Updated 6 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- PS3 NAND/NOR/eMMC Flash Dumper☆11Sep 24, 2019Updated 6 years ago
- decrypt TLS traffic of arbitrary go binaries using SSLKEYLOGFILE debugger hook☆16Oct 24, 2021Updated 4 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- Packet injection for wifi; simplified.☆39Mar 28, 2026Updated last month
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Sorano☆16Jul 30, 2019Updated 6 years ago
- Enumerate all visible network printers in local network☆19Jan 23, 2017Updated 9 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- dnsQmon - Linux Python DNS Query Monitor☆20Jul 2, 2017Updated 8 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- Anti-VM, malware sandbox detection and evasion.☆13Jun 13, 2022Updated 3 years ago
- A Batch Script to uninstall multiple Android Apps at once☆16Nov 4, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated 3 months ago
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Bad Storage is a project for unlocking up to 2 TB internal storage for those using the Xbox 360 Bad Update exploit.☆50Oct 13, 2025Updated 6 months ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 8 years ago
- ☆12Oct 21, 2021Updated 4 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- yaml version of https://github.com/hboutemy/mcmm☆13Updated this week
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week