zsh plugin for metasploit framework
☆14Nov 1, 2017Updated 8 years ago
Alternatives and similar repositories for zsh_plugins
Users that are interested in zsh_plugins are comparing it to the libraries listed below
Sorting:
- CTF write-ups from the VulnHub CTF Team☆10Mar 23, 2018Updated 7 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- Metasploit Framework☆26Feb 10, 2026Updated 3 weeks ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- Practice Web App written in python with some vulnerabilities.☆34Mar 19, 2021Updated 4 years ago
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- Mixtures.info website source code.☆12Jan 28, 2025Updated last year
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆35Jun 21, 2015Updated 10 years ago
- ☆10Nov 28, 2021Updated 4 years ago
- Operating System: CPU Scheduling Algorithms☆10Aug 18, 2020Updated 5 years ago
- AARGH - An Arch Ricing Gentle Helper☆10Aug 22, 2025Updated 6 months ago
- An attempt to predict price changes in Runescape using Machine Learning.☆10Aug 28, 2018Updated 7 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- Lateral Movement and Data Access artifacts for Velociraptor☆17Dec 2, 2025Updated 3 months ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Piet language in Ruby☆13Nov 12, 2024Updated last year
- just a python script for cve-2017-12615☆11Oct 1, 2017Updated 8 years ago
- A vim plugin that lets you search with multiple tags.☆10Oct 1, 2020Updated 5 years ago
- Script Android from TCP socket☆12May 13, 2022Updated 3 years ago
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago
- ☆14Nov 16, 2024Updated last year
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- Config manager for League of Legends☆11Aug 28, 2025Updated 6 months ago
- An efficient Python script to obfuscate code by renaming identifiers.☆12Jun 29, 2023Updated 2 years ago
- ☆10Dec 24, 2024Updated last year
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- ☆11Jul 16, 2018Updated 7 years ago
- Useful dotfiles for i3, Ghostty, tmux, neovim, git, zsh and more | Tested weekly on CI☆11Aug 11, 2025Updated 6 months ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recomman…☆11Mar 2, 2023Updated 3 years ago