Cross-Platform Malware development framework [ MacOS, Linux & Windows ]
☆23Nov 29, 2024Updated last year
Alternatives and similar repositories for gryphon
Users that are interested in gryphon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC - Discord Grabber in Golang 2023 (Windows/Linux)☆14Mar 27, 2023Updated 3 years ago
- A runtime Crypter written in C++ to bypass AVs signature based detection☆41Apr 7, 2023Updated 3 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- An offensive security framework for writing payloads☆19Sep 13, 2022Updated 3 years ago
- Code injection from Linux kernel to a process☆24May 19, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆16Apr 14, 2020Updated 6 years ago
- 🔐🐘 PostgreSQL WebAuthn Server☆14Sep 30, 2025Updated 7 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- ☆16Feb 10, 2020Updated 6 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 11 years ago
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- A tool for converting BIP39 mnemonic phrases to addresses and private keys, creating and signing transactions.☆11Feb 19, 2026Updated 2 months ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Light-weight, cross-platform (NET Core 2.1) C# Asynchronous file server and text messaging platform. Utilizes custom extension methods wh…☆12Mar 28, 2019Updated 7 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆67May 26, 2025Updated 11 months ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 4 years ago
- ☆21Feb 6, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- .NET Core minimal DNS server - .NET Core Port of ARSoft.Tools.Net☆12May 30, 2023Updated 2 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Search a list of domains on the wayback machine☆15Jun 8, 2019Updated 6 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago