Purpose-built Red Team network hardware implant made from common components.
☆28Mar 18, 2023Updated 3 years ago
Alternatives and similar repositories for T-Mobster_Implant
Users that are interested in T-Mobster_Implant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Sep 26, 2023Updated 2 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆13Apr 12, 2023Updated 3 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆29Apr 30, 2025Updated 11 months ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- Never forget the resource that helps to close that sales call! Power a real-time speech-to-text agent with retrieval augmented generation…☆14Jan 23, 2024Updated 2 years ago
- Tool for efficient directory enumeration☆64Jan 27, 2026Updated 3 months ago
- Proxmark3 client for Android☆27Jul 2, 2017Updated 8 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Static Obfuscar Deobfuscator☆21Aug 31, 2019Updated 6 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- PoC code of AOT poisoning presented at Black Hat Asia 2023☆12May 10, 2023Updated 2 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- ☆14Mar 19, 2024Updated 2 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Burp extension for processing requests and responses with Python.☆10Jun 19, 2018Updated 7 years ago
- 2022 Updated Kernelmode-Code☆32Mar 23, 2024Updated 2 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- A toolkit that provides easy access with procfs and devfs☆14Sep 27, 2022Updated 3 years ago
- Cross-Site Scripting (XSS) is a common vulnerability that allows attackers to inject malicious scripts into web pages viewed by users. In…☆11Sep 10, 2024Updated last year
- Payloads for Web Application Security Testing☆15Dec 1, 2025Updated 4 months ago
- AI-powered pentesting framework with automated recon and exploitation. Multi-source subdomain discovery, active vuln testing (XSS/SQLi/SS…☆57Dec 27, 2025Updated 4 months ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Dec 13, 2022Updated 3 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Apr 7, 2024Updated 2 years ago
- hacking-tutorials hacking-tutorials A Hacking tutorial collection. Most stuff is outdated. ONLY for educational purposes.☆12Jul 16, 2023Updated 2 years ago
- ☆14Jan 29, 2022Updated 4 years ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 9 months ago