Lists (6)
Sort Name ascending (A-Z)
Starred repositories
Payload Generation Framework
Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading
Go shellcode loader that combines multiple evasion techniques
Perfect DLL Proxying using forwards with absolute paths.
encryptedninja / fakemeeting
Forked from ExAndroidDev/fakemeetingCreates and sends fake meeting invite
encryptedninja / Mythic
Forked from its-a-feature/MythicA collaborative, multi-platform, red teaming framework
encryptedninja / HavocC2
Forked from HavocFramework/HavocThe Havoc Framework
Code execution/injection technique using DLL PEB module structure manipulation
Python example app from the OpenAI API quickstart tutorial
We have made you a wrapper you can't refuse
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
tool used to change your IP every second your want
nnposter's alternate fingerprint dataset for Nmap script http-default-accounts
A swiss army knife for pentesting networks
Various *nix tools built as statically-linked binaries
Reverse-HTTP Redirector via DigitalOcean Apps Platform
Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs
encryptedninja / Tasmota
Forked from arendst/TasmotaAlternative firmware for ESP8266 and ESP32 based devices with easy configuration using webUI, OTA updates, automation using timers or rules, expandability and entirely local control over MQTT, HTTP…
This tool retrieves tokens for all devices connected to Xiaomi cloud and encryption keys for BLE devices.
This Ansible collection provides battle tested hardening for Linux, SSH, nginx, MySQL
The recursive internet scanner for hackers. 🧡
Python utility that generates "imageless" QR codes in various formats
bluet / proxybroker2
Forked from constverum/ProxyBrokerThe New (auto rotate) Proxy [Finder | Checker | Server]. HTTP(S) & SOCKS 🎭
Indicators of Compromises (IOC) of our various investigations
Weaponizing Splunk Presentation including Splunk Apps for penetration testing.
This repo contains some Amsi Bypass methods i found on different Blog Posts.
