soez / cryptovenom
Cryptovenom: The Cryptography Swiss Army Knife
☆9Updated 5 years ago
Alternatives and similar repositories for cryptovenom:
Users that are interested in cryptovenom are comparing it to the libraries listed below
- some sploits☆17Updated 5 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- AI Powered Sensitive Information Detection☆18Updated 11 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 9 months ago
- ☆18Updated 10 months ago
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- AMSI detection PoC☆31Updated 4 years ago
- Noob Penetration tester☆11Updated 9 months ago
- ☆15Updated 2 years ago
- NSE script to detect ProxyOracle☆14Updated 3 years ago
- ☆9Updated 9 months ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- ☆23Updated 2 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- Copy as XMLHttpRequest BurpSuite extension☆30Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- OSED Practice binary☆24Updated last year
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated this week
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆11Updated 9 months ago
- 2022 CTF public release☆24Updated 2 years ago
- A simple way to exfiltrate data using spotify API☆18Updated last week
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated last month