stealth
A type of video game, where the player primarily uses stealth to avoid or overcome antagonists.
Here are 81 public repositories matching this topic...
Analysis of Bot Protection systems with available countermeasures
-
Updated
Dec 4, 2021 - JavaScript
Know the dangers of credential reuse attacks.
-
Updated
Mar 28, 2019 - Python
Current implementation of proclist plugin uses win32_ps_list_procs() php function on Windows host.
Therefore, linux implementation is a simple system("ps -a"), which is OPSEC unsafe, an would probably trigger EDR alerts.
A better implementation should avoid relying on system command execution.
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
-
Updated
Jan 19, 2022 - C
Linux post-exploitation framework made by linux user
-
Updated
Mar 22, 2022 - Go
An open source Ruby framework for text and voice chatbots.
-
Updated
Mar 16, 2022 - Ruby
Doesnt ouput target
Hey mate, real quick when I run the tool in my lab it says "Cred successful (maybe even Admin access!): USER :: PASS " but it doesnt tell me what machines it is. I added a basic
+ '@' + target to each code print statement to make it easier for myself when using it.
I just think its a really good tool and something simple like the above would be a real QoL improvement
When this modal appears the script execution is stopped, it does not execute your next action.
I've encountered this issues on Amazon & Google.
Is there a way to detect and interact with permission, to click on Block or Allow ?
Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. Blackcat keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capture system screenshot and send to ftp server in given time.
-
Updated
May 20, 2021 - C++
I wanted to make a note of this before I forget
We can leverage device farms for creating fingerprint database / set.
Because we can opt for real devices and would have hundreds to select from (not to mention a simple framework) creating and regenerating profiles from ddump shouldn't be an issue. When I get some free time this week I do plan on doing this.
(on a side note - i do believe one
A stealthy, simple, unobtrusive music player that stays out of your way
-
Updated
Mar 1, 2022 - TypeScript
The content of this repository was reunited with the history of it's ancestors. It's archived now to keep all former release artifacts. The new repository is available at https://github.com/aliascash/alias-wallet
-
Updated
Apr 13, 2021 - C++
Useful and easy to understand examples written in Node.js and .NET Core about web scraping and automated browsing with Kameleo Client
-
Updated
Feb 18, 2022 - JavaScript
A first-person character controller, inspired by the Thief games.
-
Updated
Dec 12, 2020 - GDScript
Testing the proxies for proper dns resolving capabilities (functioning, then ensuring the proxies aren't returning any unexpected responses) may be of interest to some users.
Several self-defense shellcodes
-
Updated
Jul 16, 2019 - Assembly
UDP port knocking suite with HMAC-PSK authentication.
-
Updated
Aug 9, 2020 - Python
Facebook Messenger driver for Stealth
-
Updated
Sep 21, 2020 - Ruby
RBS late 2019 GTX1650 Hackintosh WIP
-
Updated
Jul 9, 2020
#1 HPI Game Jam: A game about space, chicken wings and easter bunnys. Can you evade the chicken mafia and successfully navigate your spacecraft through the endless dimensions of space?
-
Updated
Sep 1, 2018 - GDScript
- Wikipedia
- Wikipedia


Real User-Agent is detectable with <iframe> when using "puppeteer-extra-plugin-stealth". To prevent it use "'--disable-features=site-per-process'" argument for puppeteer.launch(). See explanation: puppeteer/puppeteer#2548
Real screen size is also detectable with iframe, to prevent it I used preload() script.
OS: Windows 10
"puppeteer": 3.0.4
"puppeteer-extra": 3.1