tanc7 / Hyperjackers-Handbook
A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtrual Machine)
☆15Updated 6 years ago
Alternatives and similar repositories for Hyperjackers-Handbook:
Users that are interested in Hyperjackers-Handbook are comparing it to the libraries listed below
- Seven different DLL injection techniques in one single project.☆10Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Local Privilege Escalation Miner☆23Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 2 months ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆12Updated 3 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- ☆16Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Updated last year
- recover Firefox and more browsers logins☆49Updated 3 years ago
- ☆7Updated 5 years ago