Cryptogenic / MD5-Magic-File-Generator
A project in Golang that will create prefix-based magic MD5 hashes for type juggling.
☆19Updated 6 years ago
Alternatives and similar repositories for MD5-Magic-File-Generator
Users that are interested in MD5-Magic-File-Generator are comparing it to the libraries listed below
Sorting:
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- ☆36Updated 5 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- ☆17Updated 4 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- ☆13Updated 5 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- All the content from my Troopers 19 talk☆12Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- All challenges I created for CTF☆12Updated 3 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- ☆8Updated 4 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Format string exploit generation☆10Updated 9 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- ☆19Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- The Multiplatform Linux Sandbox☆15Updated last year