Generic malicious browser check written in C#
☆13Jul 18, 2016Updated 9 years ago
Alternatives and similar repositories for BrowserCheck
Users that are interested in BrowserCheck are comparing it to the libraries listed below
Sorting:
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Download and loader .NET payload☆36Oct 8, 2019Updated 6 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 4 months ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- ☆16Jun 13, 2022Updated 3 years ago
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Jan 19, 2016Updated 10 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Mar 20, 2019Updated 7 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Jun 6, 2023Updated 2 years ago
- Rogue Synergy server☆18Mar 8, 2017Updated 9 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- ☆19May 31, 2017Updated 8 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Dec 24, 2014Updated 11 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- Generates anti-sandbox analysis HTA files without payloads☆121Mar 16, 2017Updated 9 years ago