Cisco-Talos / useful-tools
☆16Updated 2 years ago
Alternatives and similar repositories for useful-tools:
Users that are interested in useful-tools are comparing it to the libraries listed below
- module for certexfil☆15Updated 2 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆13Updated 6 years ago
- ☆16Updated 7 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 6 months ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- ☆45Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- Injection of MSIL using Cecil☆12Updated 9 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 9 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- A simple shellcode runner☆20Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- ☆22Updated 4 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 7 years ago
- Quantum Insert Backdoor POC☆11Updated 7 years ago