GithubHelp home page GithubHelp logo

pedro ubuntu's Projects

backdoorppt icon backdoorppt

transform your payload.exe into one fake word doc (.ppt)

bash-oneliner icon bash-oneliner

A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.

cdpsvclpe icon cdpsvclpe

Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)

cmdlinespoofer icon cmdlinespoofer

How to spoof the command line when spawning a new process from C#.

cobalt-wipe icon cobalt-wipe

Cobalt wipe is the non-commercial version of Cobalt-Strike 4.3 (May 2021 Release)

crowbar icon crowbar

Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.

dkmc icon dkmc

DKMC - Dont kill my cat - Malicious payload evasion tool

emojify icon emojify

Obfuscate your python script by converting it to emoji icons

icmpdoor icon icmpdoor

ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)

jpgtomalware icon jpgtomalware

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.

lolbas icon lolbas

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

meterpeter icon meterpeter

C2 Powershell Command & Control Framework with BuiltIn Commands

morpheus icon morpheus

Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)

netool-toolkit icon netool-toolkit

MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --

pandorabox icon pandorabox

Transform your batch (bat) script into one binary.exe

powerglot icon powerglot

Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, lateral movement, reverse shell, etc.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.