0vercl0k / j0llyDmpr
j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your computer. In order to dump potentialy interesting files, you can use a rule on the file name or/and on the file size.
☆40Updated 13 years ago
Alternatives and similar repositories for j0llyDmpr:
Users that are interested in j0llyDmpr are comparing it to the libraries listed below
- Ring3 Rootkit Backdoor.☆41Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆43Updated 7 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 7 years ago
- Bootkits Revisited☆41Updated 10 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆12Updated 9 years ago
- ☆12Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆50Updated 9 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Simple windows backdoor command shell.☆21Updated 7 years ago
- Shellcode Of Death☆38Updated 11 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Various Crypter Project☆51Updated 11 years ago
- ☆24Updated 9 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆32Updated 7 years ago
- ☆45Updated 6 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- Anti-AV compilation☆42Updated 11 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- KINS Banking Trojan☆62Updated 10 years ago
- ☆24Updated 6 years ago