☆22Apr 11, 2025Updated 11 months ago
Alternatives and similar repositories for SMB-Write-Checker
Users that are interested in SMB-Write-Checker are comparing it to the libraries listed below
Sorting:
- Recursos y materiales vistos, usados, en el taller de Introducción al Hacking Ético, que ha sido impartido por Jesús Eduardo Lugo Vela y …☆14Mar 14, 2024Updated 2 years ago
- ☆29Jun 18, 2025Updated 9 months ago
- PowerShell & Python tools developed for CTFs and certification exams☆70Aug 10, 2025Updated 7 months ago
- ☆82Apr 28, 2025Updated 10 months ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆67Oct 20, 2025Updated 5 months ago
- ☆54Updated this week
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆110Aug 21, 2025Updated 7 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- External Playbooks for Public Access☆41Jan 31, 2025Updated last year
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- ☆14Jan 2, 2026Updated 2 months ago
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10May 20, 2025Updated 10 months ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- ☆16Aug 25, 2025Updated 6 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆121Nov 5, 2025Updated 4 months ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- ☆18Jan 9, 2025Updated last year
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- Threat Modelling Assets (STRIDE, DREAD, etc. cheat sheets)☆13Apr 16, 2020Updated 5 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- ☆29Aug 24, 2025Updated 6 months ago
- Node-Red node for M-Bus protocol☆12Sep 18, 2025Updated 6 months ago
- A PHP wrapper template to execute PowerShell payloads☆11Apr 2, 2021Updated 4 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆11Dec 5, 2019Updated 6 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆16Jan 22, 2025Updated last year
- 🔍Lookup and Analyze Packet Capture ('PCAP') Files☆13Mar 17, 2019Updated 7 years ago
- ☆143Feb 26, 2026Updated 3 weeks ago
- Collection of exploits developed by your friendly clown☆14Oct 18, 2025Updated 5 months ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 4 months ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆32Jan 27, 2026Updated last month