Triple OS Malware development framework [ MacOS, Linux & Windows ]
☆21Nov 29, 2024Updated last year
Alternatives and similar repositories for gryphon
Users that are interested in gryphon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A runtime Crypter written in C++ to bypass AVs signature based detection☆41Apr 7, 2023Updated 3 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Oct 9, 2020Updated 5 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Sep 15, 2023Updated 2 years ago
- An offensive security framework for writing payloads☆17Sep 13, 2022Updated 3 years ago
- ☆14Apr 21, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Code injection from Linux kernel to a process☆24May 19, 2023Updated 2 years ago
- ☆15Jan 22, 2017Updated 9 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- 🔐🐘 PostgreSQL WebAuthn Server☆14Sep 30, 2025Updated 6 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- ☆16Feb 10, 2020Updated 6 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- A Neovim Jira plugin☆11Apr 20, 2023Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆15Feb 25, 2022Updated 4 years ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 4 years ago
- ☆21Feb 6, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- 读取微信联系人列表,版本(3.9.12.51)☆13Mar 22, 2025Updated last year
- ECDSA for PostgreSQL☆15Mar 22, 2023Updated 3 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Wifi Adapter TxPower Tuner is a Python tool for Linux that adjusts wireless Tx-Power. It offers a user-friendly interface to set Tx-Power…☆12Feb 5, 2024Updated 2 years ago
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- ☆26May 19, 2022Updated 3 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Search a list of domains on the wayback machine☆15Jun 8, 2019Updated 6 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 10 months ago