PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters
☆15May 26, 2019Updated 6 years ago
Alternatives and similar repositories for PoC-Hide-Python-Malscript-UnicodeChars
Users that are interested in PoC-Hide-Python-Malscript-UnicodeChars are comparing it to the libraries listed below
Sorting:
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- ☆16Dec 31, 2016Updated 9 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- ☆44Dec 31, 2016Updated 9 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆46Aug 21, 2019Updated 6 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- 微信支付宝个人收款码管理平台☆10Jun 17, 2020Updated 5 years ago
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- ☆20Aug 19, 2017Updated 8 years ago
- Penetration Test / Read Team - C# tools repository☆55Dec 23, 2021Updated 4 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Oct 21, 2018Updated 7 years ago
- NTPD remote DOS exploit and vulnerable container☆25Oct 30, 2017Updated 8 years ago
- Simple and sane cryptographic wrapper library.☆33Apr 21, 2023Updated 2 years ago
- An advanced Windows Keylogger with features like (Disable CMD, Screenshotter, Client Stub Builder, Low Level Keyhooks, Hide Application, …☆32Oct 12, 2017Updated 8 years ago
- vmp3.2授权分析☆30Oct 29, 2018Updated 7 years ago
- post/windows/manage/enable_rdp Metaploit module in Command prompt module☆36Apr 21, 2019Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Mar 13, 2021Updated 4 years ago
- Only Hitting PoC [Tested on Windows Server 2008 r2]☆127May 28, 2019Updated 6 years ago
- ☆127Apr 8, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆10Oct 9, 2024Updated last year
- Module to use a Minecraft Server through Metasploit☆10Oct 19, 2013Updated 12 years ago
- ☆38Dec 11, 2022Updated 3 years ago
- CVE-2017-11882 File Generator PoC☆35Nov 22, 2017Updated 8 years ago
- ☆32Oct 11, 2023Updated 2 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆33Sep 2, 2018Updated 7 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- dump lsass tool☆38Oct 10, 2022Updated 3 years ago
- Win32k Elevation of Privilege Poc☆83May 17, 2019Updated 6 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- This python script can help you to detect what object is in moving.☆12Nov 28, 2018Updated 7 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- ☆40Mar 17, 2018Updated 7 years ago
- C# .NET Attribute based command line argument parser☆13Dec 28, 2011Updated 14 years ago