soez / cryptovenom
Cryptovenom: The Cryptography Swiss Army Knife
☆9Updated 5 years ago
Alternatives and similar repositories for cryptovenom:
Users that are interested in cryptovenom are comparing it to the libraries listed below
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 2 months ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated last month
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆44Updated 3 years ago
- some sploits☆17Updated 6 months ago
- My nim learning experiments☆11Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆15Updated last year
- AI Powered Sensitive Information Detection☆18Updated last year
- This extension provide a Python panel for writing custom proxy script.☆15Updated 5 years ago
- ☆19Updated 4 years ago
- ☆9Updated 10 months ago
- ☆17Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 10 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆43Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- FireProx written in Go☆19Updated 11 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 10 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Updated 9 months ago
- Noob Penetration tester☆11Updated 10 months ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Presentaciones de congresos☆52Updated 9 months ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- Basic Dart reverse shell code☆21Updated last year
- PoC for CVE-2020-11651☆6Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago