Generic malicious browser check written in C#
☆13Jul 18, 2016Updated 9 years ago
Alternatives and similar repositories for BrowserCheck
Users that are interested in BrowserCheck are comparing it to the libraries listed below
Sorting:
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- ☆16Jun 13, 2022Updated 3 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- Download and loader .NET payload☆36Oct 8, 2019Updated 6 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 6 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Jun 6, 2023Updated 2 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- Rogue Synergy server☆18Mar 8, 2017Updated 8 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Jan 11, 2015Updated 11 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- ☆19May 31, 2017Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Mar 20, 2019Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- Manage Engine Decrypter☆24Oct 17, 2022Updated 3 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Dec 24, 2014Updated 11 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- The documents☆56Nov 2, 2017Updated 8 years ago
- A simple PDF summarizer with Node.js and groq-sdk☆11Jan 11, 2025Updated last year