Some basic shell code, when I learn <Gray Hat Hacking>
☆11Dec 6, 2014Updated 11 years ago
Alternatives and similar repositories for Grayshell
Users that are interested in Grayshell are comparing it to the libraries listed below
Sorting:
- #INFILTRATE20 raptor's party pack.☆30Nov 10, 2025Updated 3 months ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- Deobfuscated + reverse engineered javascript malware☆30Jul 20, 2018Updated 7 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- 【python】利用百度语音识别API,百度语音合成API,图灵机器人API实现简单的对话机器人☆10Mar 13, 2021Updated 4 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆11Oct 17, 2020Updated 5 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- https://github.com/DarkSecDevelopers/HiddenEye.git☆14Apr 27, 2020Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project☆13Nov 30, 2020Updated 5 years ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- This command can be run to watch a cgroup for OOM events and run some subcommand.☆14Dec 11, 2014Updated 11 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- A generic raft library☆12Jan 23, 2026Updated last month
- 分布式、高可用的延迟调度系统、可以配合消息队列实现延迟任务队列☆12Dec 5, 2023Updated 2 years ago
- ☆11Apr 16, 2025Updated 10 months ago
- ☆11Nov 25, 2020Updated 5 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- 个人的 Neovim 配置(基于 LazyVim)☆12Updated this week
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- RetinaNet face detection model inference on edge/mobile device utilizing MNN framework.☆13Feb 27, 2023Updated 3 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/windbgshark☆11Jul 1, 2015Updated 10 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago