Simple AV Evasion for PE Files
☆41Nov 21, 2021Updated 4 years ago
Alternatives and similar repositories for morbol
Users that are interested in morbol are comparing it to the libraries listed below
Sorting:
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Get SYSTEM via SeDebugPrivilege☆24Jun 6, 2022Updated 3 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- generate payloads that force authentication against an attacker machine☆120Nov 6, 2022Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- This is writeup for Burp Suite room in tryhackme.com☆15Aug 8, 2020Updated 5 years ago
- A small reverse shell for Linux & Windows☆622Jun 5, 2024Updated last year
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 8 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- 🌯 Give me a web shell, I'll give you a terminal.☆199Dec 29, 2021Updated 4 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Nov 25, 2022Updated 3 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 9 months ago
- https://exploit.courses/☆19Apr 14, 2018Updated 7 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆19May 26, 2021Updated 4 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated last month
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- Team hashcat event writeups and tools☆53Aug 11, 2025Updated 6 months ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆183Aug 4, 2021Updated 4 years ago
- my kali desktop setup☆323Jun 13, 2024Updated last year
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Payload encoder for bypass WAF☆16Aug 6, 2019Updated 6 years ago
- A small tool to find admin panel of the website☆20Nov 21, 2022Updated 3 years ago