Create a malicious pip package (PoC)
☆12Sep 14, 2023Updated 2 years ago
Alternatives and similar repositories for malpip
Users that are interested in malpip are comparing it to the libraries listed below
Sorting:
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Feb 11, 2024Updated 2 years ago
- ☆27Jun 3, 2023Updated 2 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Oct 26, 2023Updated 2 years ago
- ☆42Feb 18, 2025Updated last year
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- A friendly orchestrator platform from the future☆17Feb 23, 2026Updated last week
- 一个高效多线程,插件化的web敏感信息收集器☆10Mar 25, 2024Updated last year
- ☆13Nov 30, 2023Updated 2 years ago
- Malware detection by entropy - ascii entropy and binary entropy☆10Mar 19, 2017Updated 8 years ago
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- 加密PHP代码混淆☆10May 27, 2024Updated last year
- ☆10Jan 21, 2022Updated 4 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- Execute Shellcode And Other Goodies From MMC☆13Jun 17, 2015Updated 10 years ago
- WASI libc implementation for WebAssembly☆15Jan 28, 2025Updated last year
- ☄️ Fast, 100% Accurate, Anti Honeypot SSH Cracker 🔑☆15May 1, 2022Updated 3 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- CLI generator for Velociraptor offline collector☆16Oct 10, 2025Updated 4 months ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- ☆11Mar 21, 2020Updated 5 years ago
- Official JavaScript/TypeScript client for the Solana Tracker Data API.☆18Updated this week
- ☆10Nov 21, 2023Updated 2 years ago
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 4 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆76Oct 27, 2025Updated 4 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51May 8, 2024Updated last year
- ☆46Jun 21, 2023Updated 2 years ago
- ☆12May 21, 2025Updated 9 months ago
- ☆19Sep 17, 2025Updated 5 months ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated 11 months ago
- ☆11Feb 13, 2024Updated 2 years ago
- Command-line tool to search for malware samples in various repositories☆12Mar 3, 2022Updated 3 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 6 months ago
- F5 BIG-IP unauthenticated remote code execution (RCE) and authentication bypass vulnerability!☆11Oct 30, 2023Updated 2 years ago
- A Keylogger written in AutoIt☆12May 26, 2014Updated 11 years ago