willshiao / PatchLinks
ποΈ Retroactively fix your Zoom recordings with a click! Won 1st Place, Best Use of GCP, Best Start-Up, and Best Entrepreneurial Hack at Citrus Hack 2020.
β10Updated 3 years ago
Alternatives and similar repositories for Patch
Users that are interested in Patch are comparing it to the libraries listed below
Sorting:
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwoβ¦β38Updated 6 years ago
- Windows 10 De-Clutter scriptβ25Updated 5 years ago
- macOS Client-Side Phishing lock screen payloadβ129Updated 6 years ago
- This contains the public CCDC materials for Cyber@UCR.β38Updated 2 years ago
- A tiny set of helper scripts for ipinfoβ17Updated 5 years ago
- Hiding implants in HTML filesβ66Updated 5 years ago
- Apfell Golang macOS/Linux/Windows implantβ90Updated 4 years ago
- A simple yet beautiful phishing proxy.β59Updated 4 years ago
- CLI tool for PKCS7 padding oracle attacksβ142Updated 4 years ago
- Cross-Platform Reverse Socks Proxy in Goβ27Updated 2 years ago
- Rosie the Pivoterβ17Updated 7 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL β¦β72Updated 6 years ago
- Password spraying on sites that require 2+ page loads and dynamic noncesβ32Updated 6 years ago
- Ansible scripts to build an attack boxβ24Updated 7 years ago
- Resources for I Want My EIP, presented at Derbycon 2017β11Updated 8 years ago
- Provides access to libhashcatβ31Updated last year
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfaβ¦β75Updated 9 years ago
- The Cloud Blockerβ108Updated 11 months ago
- #CyberBarcodeβ69Updated 2 years ago
- Utility to inject honey tokens into lsass.β28Updated 9 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.β44Updated 6 years ago
- A tool suite for use during system assessments.β35Updated 8 months ago
- various slides and presentations I've worked onβ19Updated 10 months ago
- Useful books, links, blogs, etc.β14Updated 8 years ago
- A tool to generate email addresses from LinkedIn using google dorking.β46Updated 7 years ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourcβ¦β29Updated 9 years ago
- A golang library designed to interact with Metasploitβ43Updated 4 years ago
- CTF in a box. Minimal setup required. (not production-ready yet)β83Updated 2 years ago
- Deploy redteam infrastructureβ17Updated 4 years ago
- Shellcode process injectorβ28Updated 5 years ago