Tool to make in memory man in the middle
☆125Oct 8, 2018Updated 7 years ago
Alternatives and similar repositories for MemITM
Users that are interested in MemITM are comparing it to the libraries listed below
Sorting:
- Exploits for YARA 3.7.1 & 3.8.1☆37Dec 20, 2018Updated 7 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆96Nov 4, 2021Updated 4 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- The Outlook HTML Leak Test Project☆130May 12, 2018Updated 7 years ago
- Simple NTFS crawler.☆57Aug 3, 2017Updated 8 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- A DBI tool to discover heap memory related bugs☆125Jun 25, 2018Updated 7 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Aug 22, 2016Updated 9 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Aug 24, 2019Updated 6 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- A set of exploitation/reversing aids for IDA☆422Nov 28, 2017Updated 8 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Test a network's egress controls with various levels of success and failure.☆104May 1, 2022Updated 3 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago