secretsquirrel / encryptAgit
Encrypt your git repo...
☆48Updated 2 years ago
Alternatives and similar repositories for encryptAgit:
Users that are interested in encryptAgit are comparing it to the libraries listed below
- A payload delivery system which embeds payloads in an executable's icon file!☆73Updated last year
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆31Updated 10 months ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆40Updated 2 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Basic Dart reverse shell code☆21Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆26Updated 3 weeks ago
- NanoDumpInject from https://s3cur3th1ssh1t.github.io/Reflective-Dump-Tools/ , minor edits with a few syscalls☆11Updated 2 years ago
- ☆18Updated last year
- ☆12Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- A slightly more fun way to disable windows defender☆25Updated this week
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- My nim learning experiments☆11Updated 2 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- x86_64 LKM linux rootkit☆16Updated last year
- ☆33Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- A way to use fonts to obfuscate text.☆44Updated 2 years ago
- Right-To-Left Override POC☆34Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago