Create a malicious pip package (PoC)
☆12Sep 14, 2023Updated 2 years ago
Alternatives and similar repositories for malpip
Users that are interested in malpip are comparing it to the libraries listed below
Sorting:
- ☄️ Fast, 100% Accurate, Anti Honeypot SSH Cracker 🔑☆16May 1, 2022Updated 3 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Feb 11, 2024Updated 2 years ago
- Geolocate any device using a link. (User interaction is required)☆17Sep 14, 2023Updated 2 years ago
- Image clipboard is a website to save image urls to localstorage and easily copy them later on☆19Nov 3, 2023Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Oct 26, 2023Updated 2 years ago
- A fully undetectable payload generator in python. working in 2021.☆16Sep 26, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Flash水坑修改版-添加操作系统判断,文件下载判断,exe base64编码进js内部无需302跳转伪造页面点击即可下载,js混淆☆14Nov 10, 2023Updated 2 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- 加密PHP代码混淆☆10May 27, 2024Updated last year
- WASI libc implementation for WebAssembly☆15Jan 28, 2025Updated last year
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- Search library for yandex.ru search engine.☆16Jun 13, 2017Updated 8 years ago
- F5 BIG-IP unauthenticated remote code execution (RCE) and authentication bypass vulnerability!☆11Oct 30, 2023Updated 2 years ago
- ☆37Feb 26, 2025Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 5 years ago
- GitHub Is the HOME ! 🔱 We believe in God, everyone else is suspicious 🔱☆28Mar 11, 2026Updated last week
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- 一个蜜罐扫描器☆13Apr 20, 2022Updated 3 years ago
- A basic and easier to use version of the Copenheimer bot created by the 5th Column from 2B2T that you can easily and simply execute using…☆27Jul 30, 2024Updated last year
- 一个集和多线程 批量验证 poc验证 存活测试 备份文件探测 后台探测 渗透测试框架。☆18May 8, 2022Updated 3 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆10Mar 14, 2018Updated 8 years ago
- ☆27Jun 3, 2023Updated 2 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- 以蓝队为核心针对红队web指纹识别☆16Mar 28, 2025Updated 11 months ago
- 自动化进行资产探测及漏洞扫描|红蓝对抗 | 快速打点 | 适用黑客进行赏金活动、SRC活动、大规模攻击使用 | 护网☆13Dec 8, 2022Updated 3 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- 配合 CVE-2023-22515 后台上传jar包实现RCE☆23Nov 9, 2023Updated 2 years ago
- 一款根据关键词批量采集url的小脚本,支持多个关键词批量采集。☆16Nov 22, 2022Updated 3 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago