Cisco-Talos / useful-tools
☆16Updated 2 years ago
Alternatives and similar repositories for useful-tools:
Users that are interested in useful-tools are comparing it to the libraries listed below
- module for certexfil☆15Updated 2 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆13Updated 6 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- How to write inline c# in xaml☆8Updated 11 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- A simple shellcode runner☆20Updated 11 years ago
- ☆22Updated 4 years ago
- Injection of MSIL using Cecil☆12Updated 9 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 7 years ago
- Experimental: Windows .text section compare - disk versus memory☆14Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Proof of concept demo for a tool that listens for keywords, and records audio to a file.☆12Updated 7 years ago
- radare2 script to help on COM objects reverse engineering☆11Updated 8 years ago
- ☆16Updated 7 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆11Updated 4 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago