MSFVenom Powershell Stager Encoder & Generator
☆15Apr 3, 2021Updated 5 years ago
Alternatives and similar repositories for turtle
Users that are interested in turtle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A lightweight ducky script generator written in python.☆36Feb 6, 2021Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13Aug 26, 2023Updated 2 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆17Jan 2, 2020Updated 6 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 5 months ago
- Herramienta en desarrollo la cual busca la sencillez a la hora de hacer PenTesting Ethicos. [NO ME HAGO RESPONSABLE DEL MAL USO DE ESTA H…☆11Aug 1, 2023Updated 2 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆40Oct 26, 2020Updated 5 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆164Jul 11, 2021Updated 4 years ago
- A Tool that Finds, Enumerates, and Exploits Reolink Cameras.☆129Aug 28, 2021Updated 4 years ago
- Roko! es un programa que te permite descargar playlist y videos de YouTube de manera sencilla.☆10Oct 28, 2022Updated 3 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Apr 19, 2021Updated 4 years ago
- Okadminfinder rewrite by Xnuvers007☆16Apr 13, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Jun 1, 2023Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- ☆13Sep 17, 2025Updated 6 months ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Sep 28, 2019Updated 6 years ago
- Parses logs created by Cobalt Strike, Brute Ratel, OC2 and creates an SQLite DB which can be used to create custom reports.☆27Mar 18, 2026Updated 3 weeks ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Sandbox evasion code snippets developped in Golang☆20Sep 19, 2022Updated 3 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 3 years ago
- Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️☆26Jul 22, 2022Updated 3 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33May 28, 2019Updated 6 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- A python Code to obfuscate any non-fud Powershell payload and generate a ready to use FUD Python executable script☆11May 18, 2020Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Dec 22, 2021Updated 4 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Feb 2, 2022Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- ssshh its a secret ;)☆21Mar 7, 2022Updated 4 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆12Oct 11, 2020Updated 5 years ago