Cryptogenic / MD5-Magic-File-Generator
A project in Golang that will create prefix-based magic MD5 hashes for type juggling.
☆19Updated 6 years ago
Alternatives and similar repositories for MD5-Magic-File-Generator:
Users that are interested in MD5-Magic-File-Generator are comparing it to the libraries listed below
- ☆36Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Executables that execute other stuff☆52Updated 6 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 5 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- ☆8Updated 4 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- CANAPE Network Testing Tool☆32Updated 6 years ago
- Regular expression Search on the command-line☆15Updated 10 months ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- ☆20Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- UAC 0Day all day!☆58Updated 7 years ago
- Snippets I used on exploit development, mostly broken.☆11Updated 7 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago