BlackArch / amap
[Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.
☆13Updated 11 years ago
Alternatives and similar repositories for amap:
Users that are interested in amap are comparing it to the libraries listed below
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- module for certexfil☆15Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- Memory searching utilities☆42Updated 11 years ago
- ☆13Updated 10 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Zerokit server controller☆13Updated 5 years ago
- it's a simple LKM rootkit.☆12Updated 8 years ago
- Removal of certain event logs within a Windows OS☆7Updated 5 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- See here:☆42Updated 12 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- A Unix rootkit☆16Updated 4 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆9Updated 8 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- ☆25Updated 6 years ago
- Decrypt Wireless Passwords On Windows☆13Updated 4 years ago
- ☆10Updated 7 years ago
- C# code to run PIC using CreateThread☆16Updated 5 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Rex library for various exploitation helpers☆22Updated last week