sean-t-smith / T-Mobster_ImplantView external linksLinks
Purpose-built Red Team network hardware implant made from common components.
☆25Mar 18, 2023Updated 2 years ago
Alternatives and similar repositories for T-Mobster_Implant
Users that are interested in T-Mobster_Implant are comparing it to the libraries listed below
Sorting:
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated last year
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- Never forget the resource that helps to close that sales call! Power a real-time speech-to-text agent with retrieval augmented generation…☆14Jan 23, 2024Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- 利用云函数实现端口扫描☆15Nov 17, 2025Updated 3 months ago
- C library that is intended for providing methods for executing and injecting code.☆17Aug 14, 2024Updated last year
- 2022 Updated Kernelmode-Code☆33Mar 23, 2024Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Apr 21, 2022Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆89Sep 16, 2025Updated 5 months ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- A jamming-and-replay attack using SDR☆18Feb 25, 2019Updated 6 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Multipurpose malware framework☆28Dec 6, 2021Updated 4 years ago
- Working Set Page Cache side-channel IPC PoC☆68Jan 9, 2019Updated 7 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- ☆22Sep 25, 2022Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Tool for efficient directory enumeration☆65Jan 27, 2026Updated 3 weeks ago
- hatsApp Message Sender is a simple Python application that allows users to send WhatsApp messages programmatically using the pywhatkit li…☆14Nov 17, 2023Updated 2 years ago
- Future version of the AnyBody Managed Model Repository with a full thoracic spine model.☆18Feb 2, 2026Updated 2 weeks ago
- maldev obviously☆28May 5, 2025Updated 9 months ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆28Apr 30, 2025Updated 9 months ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 4 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- ☆33Nov 14, 2025Updated 3 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated 2 weeks ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 4 months ago
- ☆30Nov 7, 2022Updated 3 years ago