Purpose-built Red Team network hardware implant made from common components.
☆28Mar 18, 2023Updated 3 years ago
Alternatives and similar repositories for T-Mobster_Implant
Users that are interested in T-Mobster_Implant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rubber Ducky powered by NeoKey☆29Jun 3, 2024Updated last year
- ☆14Sep 26, 2023Updated 2 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆15Jul 20, 2022Updated 3 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆29Apr 30, 2025Updated 11 months ago
- Never forget the resource that helps to close that sales call! Power a real-time speech-to-text agent with retrieval augmented generation…☆14Jan 23, 2024Updated 2 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- Tool for efficient directory enumeration☆64Jan 27, 2026Updated 2 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- PoC code of AOT poisoning presented at Black Hat Asia 2023☆12May 10, 2023Updated 2 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- ☆14Mar 19, 2024Updated 2 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- Burp extension for processing requests and responses with Python.☆10Jun 19, 2018Updated 7 years ago
- 2022 Updated Kernelmode-Code☆32Mar 23, 2024Updated 2 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- API created for and used by *Purr*☆11Jun 7, 2025Updated 10 months ago
- A toolkit that provides easy access with procfs and devfs☆14Sep 27, 2022Updated 3 years ago
- Payloads for Web Application Security Testing☆15Dec 1, 2025Updated 4 months ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Argument injection vulnerability in PHP☆13Jun 15, 2024Updated last year
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆87Sep 16, 2025Updated 6 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Dec 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A free open unofficial stacktrace translator for Zelix KlassMaster☆10Apr 10, 2019Updated 6 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Apr 7, 2024Updated 2 years ago
- hacking-tutorials hacking-tutorials A Hacking tutorial collection. Most stuff is outdated. ONLY for educational purposes.☆12Jul 16, 2023Updated 2 years ago
- Multipurpose malware framework☆28Dec 6, 2021Updated 4 years ago
- ☆14Jan 29, 2022Updated 4 years ago