Mutable Universal Relay Document Kit
☆17Oct 31, 2014Updated 11 years ago
Alternatives and similar repositories for MurDocK
Users that are interested in MurDocK are comparing it to the libraries listed below
Sorting:
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated last week
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 7 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- meterpreter connetion☆24Nov 27, 2017Updated 8 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆29Aug 27, 2017Updated 8 years ago
- Listening Post for Throwback Implant☆111Jan 26, 2016Updated 10 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Dec 25, 2015Updated 10 years ago
- ☆25Sep 28, 2020Updated 5 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Binary resource copier☆99Apr 14, 2025Updated 10 months ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆70Nov 25, 2014Updated 11 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Rethinking the User Interface of AI☆32Updated this week
- Veil Catapult is no longer supported☆75May 24, 2016Updated 9 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Sep 19, 2017Updated 8 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- A collection of anti-forensics scripts☆29Oct 19, 2025Updated 4 months ago
- ☆13Nov 5, 2024Updated last year
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- ☆38Oct 12, 2020Updated 5 years ago