A simple, quick, and dirty websocket shell for PowerShell.
☆20Jun 5, 2017Updated 8 years ago
Alternatives and similar repositories for Leviathan
Users that are interested in Leviathan are comparing it to the libraries listed below
Sorting:
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- ☆11Dec 18, 2018Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- A Golang Registry parser☆19Feb 3, 2025Updated last year
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 12 years ago
- Windows eventlog formatting, live fetching and querying utility in C☆20May 26, 2020Updated 5 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆16Jul 13, 2015Updated 10 years ago
- Malware Machine Learning☆27Apr 1, 2018Updated 7 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- LKM Rootkit based on Diamorphine☆15Oct 31, 2018Updated 7 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- My Shellcode Archive☆29Mar 21, 2017Updated 8 years ago
- Golang command line tool for the macOS Endpoint Security Framework☆29Nov 25, 2019Updated 6 years ago
- ☆25Nov 18, 2016Updated 9 years ago
- Stealth Kid RAT (SKR) is an open-source multi-platform Remote Access Trojan (RAT) written in C#. Released under MIT license. The SKR proj…☆23Sep 16, 2021Updated 4 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆31Oct 1, 2020Updated 5 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆32Nov 11, 2014Updated 11 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆132Nov 10, 2023Updated 2 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Make Windows LNK file with python (pylnk)☆64Jun 4, 2016Updated 9 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Docker Swarm - Promitheus, Grafana, Node Exporter, Loki, Promtail, Caddy☆29Jun 27, 2020Updated 5 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Oct 10, 2019Updated 6 years ago
- A Microsoft windows x86_64 Golang shellcode tester that includes example calc.exe shellcode.☆69Apr 6, 2018Updated 7 years ago
- Simple parser framework.☆26Jun 21, 2023Updated 2 years ago
- ☆63Nov 15, 2016Updated 9 years ago
- Learn from Casey Smith@subTee☆29Apr 17, 2021Updated 4 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- An ELF parasite command injector.☆34Oct 24, 2017Updated 8 years ago