Cryptogenic / MD5-Magic-File-GeneratorLinks
A project in Golang that will create prefix-based magic MD5 hashes for type juggling.
☆20Updated 7 years ago
Alternatives and similar repositories for MD5-Magic-File-Generator
Users that are interested in MD5-Magic-File-Generator are comparing it to the libraries listed below
Sorting:
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- Control Flow Guard Teleportation demo☆23Updated 6 years ago
- ☆36Updated 5 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- ☆25Updated 4 months ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆35Updated 6 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆23Updated 5 years ago
- ☆52Updated 8 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- bunch of random stuff☆21Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- ☆48Updated 5 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Updated 7 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Anything related to Ghidra☆12Updated 6 years ago
- Small fuzzing library with an example script using it.☆20Updated 4 years ago