Open Source C2IS (Command and Control Information System)
☆69Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for ODIN
Users that are interested in ODIN are comparing it to the libraries listed below
Sorting:
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆57Apr 12, 2020Updated 5 years ago
- MetOClient WMS animator library and UI☆17Updated this week
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆62Apr 18, 2019Updated 6 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Apr 20, 2021Updated 4 years ago
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆16Oct 1, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- A list of weird comparison in SQL☆15May 20, 2022Updated 3 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- a tool that facilitates eavesdropping and man-in-the-middle attacks☆16Mar 20, 2013Updated 12 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Feb 14, 2026Updated 2 weeks ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆70Feb 13, 2021Updated 5 years ago
- various python scripts☆16Jun 15, 2021Updated 4 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- My software engineering notes.☆24Nov 12, 2025Updated 3 months ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Minimal workflows☆20Mar 19, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- ☆78Oct 18, 2022Updated 3 years ago
- A Python spider using Selenium to crawl Facebook user profile information such as first name,last name,work information,education informa…☆18May 17, 2017Updated 8 years ago
- [OLD] Terraform provider plugin for Linode Cloud resources.. See☆15Oct 18, 2018Updated 7 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Jan 23, 2022Updated 4 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Backend for Nuclear Pond☆21Dec 7, 2023Updated 2 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆19May 29, 2017Updated 8 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- ☆26Mar 10, 2022Updated 3 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆29Apr 10, 2024Updated last year
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- A python network scanner using scapy☆24Mar 21, 2020Updated 5 years ago
- ☆21Nov 13, 2019Updated 6 years ago