- Portugal
- https://linktr.ee/WafflesExploits
Pinned Loading
-
hide-payload-in-images
hide-payload-in-images PublicA project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from …
-
CobaltStrike-YARA-Bypass-f0b627fc
CobaltStrike-YARA-Bypass-f0b627fc PublicRepository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.
-
Dynamic-HTTP-Payload-Stager
Dynamic-HTTP-Payload-Stager PublicA dynamic HTTP/s Payload Stager that automates updating decryption variables, saving time and effort in managing shellcode loaders.
-
Bloodhound-query-legacy2ce
Bloodhound-query-legacy2ce PublicA Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to the API or save them to a file for later use.
Python 7
-
WafflesFORCE
WafflesFORCE PublicMulti-threaded Login Bruteforcer for Bypassing CRSF Tokens Protections
Python 6
-
httpserver-plus
httpserver-plus PublicAn improved version of Python's http.server, created for redirection purposes.
Python 4
If the problem persists, check the GitHub status page or contact support.