Ambush Host Intrusion Prevention System
☆65Sep 8, 2013Updated 12 years ago
Alternatives and similar repositories for Ambush
Users that are interested in Ambush are comparing it to the libraries listed below
Sorting:
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago
- miscellaneous scripts and things...☆22May 12, 2016Updated 9 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- An opensource project similar to HoneyDocs☆26Oct 10, 2015Updated 10 years ago
- the green eyed monster☆22Sep 30, 2012Updated 13 years ago
- Replacement vphysics module for Garry's Mod☆29May 30, 2012Updated 13 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Jan 7, 2013Updated 13 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- ☆12Aug 29, 2025Updated 6 months ago
- ☆31Jul 27, 2020Updated 5 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- $ gem install esearchy [ NO LONGER MAINTAINED - ONLY FIXES AND MINOR UPDATES ] https://github.com/FreedomCoder/esearchy_mirai☆18Jul 6, 2012Updated 13 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- ☆16Apr 16, 2015Updated 10 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆39Mar 30, 2017Updated 8 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- Bare Knuckled AV Breaking☆58Aug 30, 2018Updated 7 years ago
- ☆18Sep 4, 2017Updated 8 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- ☆29May 4, 2016Updated 9 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago