☆18Feb 25, 2024Updated 2 years ago
Alternatives and similar repositories for sweethoney
Users that are interested in sweethoney are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 11 months ago
- maldev obviously☆28May 5, 2025Updated last year
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Training materials I've written.☆11Nov 11, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆18May 25, 2022Updated 3 years ago
- ☆49May 12, 2021Updated 4 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 3 years ago
- shell sql for fun☆45Dec 20, 2025Updated 4 months ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆39Jul 10, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆46Jun 21, 2023Updated 2 years ago
- Small utility package for manipulating Windows process tokens☆25Apr 26, 2022Updated 4 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆68Jan 13, 2026Updated 3 months ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 12 years ago
- Python wrapper around AWS Cloudfromation & Boto3 SDK☆13Mar 25, 2021Updated 5 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Shell script to download apps from Splunkbase☆24May 19, 2020Updated 5 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Aug 11, 2021Updated 4 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 9 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Mar 5, 2021Updated 5 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 6 years ago
- ☆29May 10, 2024Updated 2 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆12Jun 8, 2023Updated 2 years ago
- This is a simple program to display messages to the user and get responses back. It is used to make dialogs for scripts or simply post in…☆33Jun 29, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆16Updated this week
- Dynamic Worker Pool Library☆30Aug 3, 2019Updated 6 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆61Mar 19, 2021Updated 5 years ago
- ☆10Mar 31, 2016Updated 10 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆102Jan 7, 2022Updated 4 years ago
- A gentle introduction to developing Declarative Pipelines for Jenkins.☆13Mar 2, 2018Updated 8 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Feb 28, 2020Updated 6 years ago