☆18Feb 25, 2024Updated 2 years ago
Alternatives and similar repositories for sweethoney
Users that are interested in sweethoney are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- maldev obviously☆28May 5, 2025Updated 11 months ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Training materials I've written.☆11Nov 11, 2025Updated 5 months ago
- Tool to query the RIPE database☆11Jun 2, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Dec 4, 2024Updated last year
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆18May 25, 2022Updated 3 years ago
- An IOC framework written in PowerShell☆19Jan 3, 2017Updated 9 years ago
- ☆49May 12, 2021Updated 4 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 3 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆39Jul 10, 2020Updated 5 years ago
- CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC☆24Jun 5, 2025Updated 10 months ago
- ☆46Jun 21, 2023Updated 2 years ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆69Jan 13, 2026Updated 3 months ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 12 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 8 months ago
- Python wrapper around AWS Cloudfromation & Boto3 SDK☆13Mar 25, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆60Aug 30, 2021Updated 4 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Shell script to download apps from Splunkbase☆24May 19, 2020Updated 5 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Aug 11, 2021Updated 4 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 9 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 6 years ago
- ☆29May 10, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- ☆16Updated this week
- This is a simple program to display messages to the user and get responses back. It is used to make dialogs for scripts or simply post in…☆33Jun 29, 2024Updated last year
- CallBack-Techniques for Shellcode execution ported to Nim☆61Mar 19, 2021Updated 5 years ago
- ☆10Mar 31, 2016Updated 10 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆102Jan 7, 2022Updated 4 years ago
- A gentle introduction to developing Declarative Pipelines for Jenkins.☆13Mar 2, 2018Updated 8 years ago