Fully undetected backdoor with RSA Encrypted shell
☆11Jan 3, 2018Updated 8 years ago
Alternatives and similar repositories for TopHat
Users that are interested in TopHat are comparing it to the libraries listed below
Sorting:
- A server sided strafe angle trainer for Counter Strike: Source and Counter Strike: Global Offensive written in sourcepawn.☆10Jan 4, 2018Updated 8 years ago
- Decoder of binary serial stream from HAN port of power meters in Norway☆16Jul 21, 2025Updated 8 months ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆25Dec 4, 2020Updated 5 years ago
- Say numbers in Azerbaijani using JavaScript☆17Jan 3, 2023Updated 3 years ago
- Fast zcat with mmap and miniz☆24Jan 18, 2015Updated 11 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- IPv6 Excuses☆10Sep 11, 2018Updated 7 years ago
- A new revolution in the Penetration Testing scene... for kali Linux☆14Feb 14, 2014Updated 12 years ago
- ☆10May 25, 2015Updated 10 years ago
- The official repository of the free version of DPCalendar, the Joomla calendar and event manager☆10Feb 26, 2026Updated 3 weeks ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- ☆11Aug 13, 2021Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- WebShell Collect☆11Jan 25, 2015Updated 11 years ago
- A small 6502 system build on a Lattice Icestick FPGA development board☆16Jun 24, 2019Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- ☆43Feb 18, 2013Updated 13 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- Hardening audit scripts validating Workstations and Servers based on CIS benchmarks☆16Aug 19, 2025Updated 7 months ago
- ☆54Sep 6, 2020Updated 5 years ago
- The software development kit provides a library for communicating with a Boogie Board Sync on Chrome.☆11Mar 24, 2015Updated 10 years ago
- 🌠 Learn how to use IPFS to store data on the ultimate decentralised/distributed file system!☆33Jan 30, 2019Updated 7 years ago
- A map that will hold the routes and stops of all the buses and vans in Lebanon. This data is meant to be public and available in order to…☆12Feb 15, 2019Updated 7 years ago
- Black Hat Python workshop for Disobey 2019☆30Feb 19, 2019Updated 7 years ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆27Jun 25, 2014Updated 11 years ago
- A federated article platform for journalists, powered by ActivityPub☆19Sep 10, 2018Updated 7 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- ☆15May 17, 2018Updated 7 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- Mirror of https://bitbucket.org/cpchain/chain☆51Dec 14, 2022Updated 3 years ago
- The DjangoCon US 2019 conference website☆17Jan 8, 2023Updated 3 years ago