A simple, quick, and dirty websocket shell for PowerShell.
☆20Jun 5, 2017Updated 8 years ago
Alternatives and similar repositories for Leviathan
Users that are interested in Leviathan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- ☆11Dec 18, 2018Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 6 years ago
- LKM Rootkit based on Diamorphine☆15Oct 31, 2018Updated 7 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- My Shellcode Archive☆29Mar 21, 2017Updated 9 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- Golang fanotify example☆25Feb 29, 2024Updated 2 years ago
- Windows eventlog formatting, live fetching and querying utility in C☆20May 26, 2020Updated 5 years ago
- A Golang Registry parser☆19Feb 3, 2025Updated last year
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- An ELF parasite command injector.☆34Oct 24, 2017Updated 8 years ago
- Docker Swarm - Promitheus, Grafana, Node Exporter, Loki, Promtail, Caddy☆29Jun 27, 2020Updated 5 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Aug 6, 2020Updated 5 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Golang command line tool for the macOS Endpoint Security Framework☆29Nov 25, 2019Updated 6 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆14Aug 18, 2021Updated 4 years ago
- Heroku-like memorable random name generator☆37Dec 22, 2022Updated 3 years ago