Fully undetected backdoor with RSA Encrypted shell
☆11Jan 3, 2018Updated 8 years ago
Alternatives and similar repositories for TopHat
Users that are interested in TopHat are comparing it to the libraries listed below
Sorting:
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- A new revolution in the Penetration Testing scene... for kali Linux☆14Feb 14, 2014Updated 12 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- Penetration Test / Read Team - C# tools repository☆55Dec 23, 2021Updated 4 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Jun 25, 2014Updated 11 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- Anti-.NET Malware/Packers - Detect most .NET Packers (and some native) used for malware.☆25May 7, 2017Updated 8 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- ☆29Jul 11, 2015Updated 10 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- ☆37Sep 30, 2021Updated 4 years ago
- Script for turning a Raspberry Pi into a Honey Pot Pi☆35Sep 25, 2024Updated last year
- The official repository of the free version of DPCalendar, the Joomla calendar and event manager☆10Updated this week
- Copy and Paste standard library (CPSTL) is a repository with a collection of data structure and algorithms in many different languages☆13Feb 15, 2025Updated last year
- Dead simple JSON Formatter☆10Oct 21, 2016Updated 9 years ago
- 📄Source code variable naming using a seq2seq architecture☆10Mar 19, 2020Updated 5 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- ☆15Feb 15, 2022Updated 4 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- A maid cafe's maid AI assistant with Microsoft Semantic Kernel☆10May 11, 2024Updated last year
- Identifies music based on microphone input. By request of someone in r/learnprogramming.☆19Dec 8, 2012Updated 13 years ago
- A collection of advent of code solutions.☆10Dec 28, 2015Updated 10 years ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- DLL Generator for side loading attack☆175Feb 5, 2019Updated 7 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- ☆10May 25, 2015Updated 10 years ago