x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)
☆85Nov 7, 2020Updated 5 years ago
Alternatives and similar repositories for pop-nedry
Users that are interested in pop-nedry are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Encrypted exploit delivery for the masses☆271Sep 25, 2019Updated 6 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- ☆524Aug 11, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆178Jul 21, 2020Updated 5 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- few months old but better than nothing☆58Feb 11, 2022Updated 4 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆366Nov 19, 2024Updated last year
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Local Privilege Escalation☆210Feb 28, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Jul 16, 2023Updated 2 years ago
- C# code to run shellcode in a sneaky way☆93Oct 2, 2020Updated 5 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago
- PowerShell Script to Dump Windows Credentials from the Credential Manager☆733Dec 12, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Open source offensive security platform for red team, by red team.☆385Oct 23, 2017Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated 2 months ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Jul 8, 2017Updated 8 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago