Skip to content
View intratable's full-sized avatar
  • ACAB스키
  • 0.0.0.0

Block or report intratable

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Bypass Windows UAC Technique

PowerShell 10 2 Updated Oct 14, 2022

Use StyleGAN2 & First Order Motion Model to Generate and Animate faces with Deep Learning for hypothetical use case of the Netflix Platform.

Jupyter Notebook 6 3 Updated Jun 28, 2020

Custom scan profiles for use with Burp Suite Pro

155 35 Updated Mar 21, 2024

Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019

C# 1,822 231 Updated Sep 4, 2024

These are my checklists which I use during my hunting.

HTML 864 112 Updated Nov 30, 2023

Instagram report automatize

Python 7 2 Updated Mar 17, 2025

RDP web client with Golang backend for proxy connection to Windows machine

Go 93 21 Updated Dec 19, 2024

API Telegram client library, for bots too!

Python 6 1 Updated Nov 1, 2024

automates the setup and configuration of a VPS for web services.

Python 2 Updated Nov 1, 2024

automatically fetches shortened URLs from multiple services

Python 2 Updated Nov 1, 2024

Offensive Powershell obfuscator

Python 2 Updated Nov 1, 2024

Telegram report automatize | sessions | scraping web | smtp

Python 8 2 Updated Dec 2, 2024

Telegram ghost views with proxies

Python 8 Updated Mar 17, 2025

Shellcode loader with evasion capabilities written in Nim

Nim 16 2 Updated Jan 25, 2025

AMSI Bypass - Credits @ZeroMemoryEx

Python 6 Updated Jun 30, 2025

OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once installed we will have remote administrative access to our target t…

Python 171 35 Updated May 24, 2025

A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting

PowerShell 825 126 Updated May 1, 2026

Inject a JS file into a PDF file.

Java 381 69 Updated Dec 11, 2019

"Email Spoofing App is a tool for sending emails with a spoofed sender address and name. Features include HTML templates, attachments. For educational purposes only.

Python 4 1 Updated Mar 30, 2023

Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...

C 170 30 Updated Sep 12, 2024

Search & Parse Password Leaks

Python 424 51 Updated Sep 27, 2024

TCP Port Redirection Utility

C 780 120 Updated Jan 31, 2023

✉️ HTML Smuggling generator&obfuscator for your Red Team operations

JavaScript 189 25 Updated Feb 27, 2024

Automated wifi deauthenticator of clients using MDK3.

Shell 5 1 Updated Dec 1, 2016

kill windows log

Go 45 8 Updated Mar 26, 2024

Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)

HTML 2,591 369 Updated Dec 30, 2025

Powerful yet simple to use screenshot software 🖥️ 📸

C++ 29,872 1,913 Updated May 7, 2026
JavaScript 8 1 Updated Jul 12, 2024
Next