Purpose-built Red Team network hardware implant made from common components.
☆27Mar 18, 2023Updated 2 years ago
Alternatives and similar repositories for T-Mobster_Implant
Users that are interested in T-Mobster_Implant are comparing it to the libraries listed below
Sorting:
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- Never forget the resource that helps to close that sales call! Power a real-time speech-to-text agent with retrieval augmented generation…☆14Jan 23, 2024Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- C library that is intended for providing methods for executing and injecting code.☆17Aug 14, 2024Updated last year
- 利用云函数实现端口扫描☆14Nov 17, 2025Updated 3 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- FTDI bricker just for fun - malware POC+hardware hacking CTF☆19Sep 23, 2024Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- A jamming-and-replay attack using SDR☆18Feb 25, 2019Updated 7 years ago
- Working Set Page Cache side-channel IPC PoC☆68Jan 9, 2019Updated 7 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Damn Vulnerable CICS Application☆31Mar 2, 2024Updated 2 years ago
- Proxmark3 client for Android☆27Jul 2, 2017Updated 8 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Future version of the AnyBody Managed Model Repository with a full thoracic spine model.☆18Mar 3, 2026Updated last week
- Tool for efficient directory enumeration☆64Jan 27, 2026Updated last month
- hatsApp Message Sender is a simple Python application that allows users to send WhatsApp messages programmatically using the pywhatkit li…☆14Nov 17, 2023Updated 2 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆28Apr 30, 2025Updated 10 months ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- maldev obviously☆28May 5, 2025Updated 10 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- ☆33Nov 14, 2025Updated 3 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- AI-powered pentesting framework with automated recon and exploitation. Multi-source subdomain discovery, active vuln testing (XSS/SQLi/SS…☆56Dec 27, 2025Updated 2 months ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Jan 2, 2022Updated 4 years ago
- ☆30Nov 7, 2022Updated 3 years ago