BlackArch / amap
[Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.
☆11Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for amap
- Library to support cross-platform AES encryption☆11Updated 2 months ago
- Dalvik Header Plugin for IDA Pro☆21Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- simple rootkit for computer security class☆13Updated 11 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- DLL Injection commandline utility☆25Updated 11 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- A simple exploitable ActiveX control for RE/VR☆18Updated 10 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- See here:☆41Updated 11 years ago
- Solutions for various crackmes☆20Updated 11 years ago
- Anti live forensic linux LKM rootkit☆16Updated 7 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Format string exploit generation☆9Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- Static and Dynamic exploit analysis framework.☆21Updated 10 years ago
- Script for searching the extracted firmware file system for goodies!☆9Updated 8 years ago
- Linux kernel module netfilter backdoor demo☆9Updated 9 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Updated last year
- Functions and other Code Snippets often found in Offensive Code or Malware☆20Updated 9 years ago
- Decrypt Wireless Passwords On Windows☆13Updated 4 years ago
- it's a simple LKM rootkit.☆11Updated 8 years ago
- A rootkit implemented as a linux kernel module☆16Updated 9 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆16Updated 4 years ago
- Library to support various Hash-based Message Authentication Codes (HMAC)☆10Updated 3 weeks ago