A versatile and highly concurrent malware written in golang.
☆20Jul 2, 2021Updated 4 years ago
Alternatives and similar repositories for huntsman
Users that are interested in huntsman are comparing it to the libraries listed below
Sorting:
- EGESPLOIT is a golang library for malware development☆339Jan 26, 2017Updated 9 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Apache Tomcat Manager API WAR Shell Upload☆36Jul 9, 2020Updated 5 years ago
- Like Hell's Gate but more EGG :)☆20Mar 11, 2022Updated 4 years ago
- Free GitHub READM.md Badges☆14Dec 21, 2020Updated 5 years ago
- ☆10Apr 13, 2022Updated 3 years ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- Anti-VM, malware sandbox detection and evasion.☆14Jun 13, 2022Updated 3 years ago
- SweetPotato修改版,用于webshell下执行命令☆13Nov 22, 2020Updated 5 years ago
- Makeup store iOS app developed in Swift☆11Apr 28, 2023Updated 2 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- SqlServer Linked Password Dumper.☆17Apr 28, 2017Updated 8 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 5 years ago
- ☆42Mar 7, 2017Updated 9 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- React PWA - (Progressive Web App)☆13Aug 29, 2023Updated 2 years ago
- SheepDB is a lightweight service that uses Google Spreadsheets as a storage backend. It provides an API server for managing your data.☆11Feb 17, 2025Updated last year
- execute a PE in the address space of another PE aka process hollowing☆60Dec 2, 2021Updated 4 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- ITIX's Custom CoreOS build☆10Nov 24, 2020Updated 5 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- DLL Unhooking☆12Mar 26, 2021Updated 4 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- A simple kube-proxy addon for 1:1 NAT services in Kubernetes with NFT backend.☆17Jun 19, 2025Updated 9 months ago
- ☆12Aug 30, 2025Updated 6 months ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Offensive go lang series☆34May 2, 2020Updated 5 years ago
- material for exploit development☆18May 3, 2019Updated 6 years ago
- Коллекция полезных ресурсов по Go (rus)☆44Apr 21, 2024Updated last year
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 5 years ago
- 快速对自己项目中引入的第三方开源库进行1day patch检索,patch数据每天晚上11点更新☆21Jan 27, 2022Updated 4 years ago
- ☆19Jun 25, 2024Updated last year
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- An example on how to get a list of all windows processes.☆20Oct 20, 2017Updated 8 years ago
- Streaming Log Multiplexer - combine multiple logs to one☆11Jan 4, 2023Updated 3 years ago