Mutable Universal Relay Document Kit
☆17Oct 31, 2014Updated 11 years ago
Alternatives and similar repositories for MurDocK
Users that are interested in MurDocK are comparing it to the libraries listed below
Sorting:
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated 2 months ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆70Nov 25, 2014Updated 11 years ago
- Veil Catapult is no longer supported☆75May 24, 2016Updated 9 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- The ronin-rb.dev website☆24Jan 12, 2026Updated 2 months ago
- Dll Injection and Code injection sample☆13Mar 10, 2015Updated 11 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- A docker image for ocserv☆11May 26, 2016Updated 9 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- Easy Window domain access☆51Apr 3, 2014Updated 11 years ago
- Configs for NECCDC 2017☆16Mar 22, 2017Updated 8 years ago
- Listening Post for Throwback Implant☆111Jan 26, 2016Updated 10 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- A powershell based traffic generation scripts to simulate user activity via Internet Explorer☆15May 6, 2015Updated 10 years ago
- CVE-2021-21978 exp☆23Mar 5, 2021Updated 5 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- ☆51Feb 5, 2014Updated 12 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- ☆84Apr 18, 2017Updated 8 years ago
- Binary resource copier☆99Apr 14, 2025Updated 11 months ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"☆19Aug 28, 2021Updated 4 years ago
- meterpreter connetion☆24Nov 27, 2017Updated 8 years ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated last month
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago