Tool to make in memory man in the middle
☆125Oct 8, 2018Updated 7 years ago
Alternatives and similar repositories for MemITM
Users that are interested in MemITM are comparing it to the libraries listed below
Sorting:
- ☆43Aug 30, 2018Updated 7 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆96Nov 4, 2021Updated 4 years ago
- A DBI tool to discover heap memory related bugs☆125Jun 25, 2018Updated 7 years ago
- The Outlook HTML Leak Test Project☆131May 12, 2018Updated 7 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Test a network's egress controls with various levels of success and failure.☆104May 1, 2022Updated 3 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Aug 22, 2016Updated 9 years ago
- Windows RID Hijacking persistence technique☆178Nov 20, 2024Updated last year
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 6 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆302Jan 12, 2023Updated 3 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆172Dec 7, 2016Updated 9 years ago
- Simple NTFS crawler.☆57Aug 3, 2017Updated 8 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- a tool to make it easy and fast to test various forms of injection☆174May 2, 2019Updated 6 years ago