Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents
☆23Jan 10, 2017Updated 9 years ago
Alternatives and similar repositories for rtf_exploit_extractor
Users that are interested in rtf_exploit_extractor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆17Feb 5, 2018Updated 8 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- ☆21May 25, 2017Updated 8 years ago
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 11 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- Tools to work with 23andMe and AncestryDNA raw files☆12Aug 5, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Javascript deobfuscation tool☆17Apr 6, 2018Updated 8 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- Network Security Monitoring Framework☆49Oct 19, 2012Updated 13 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 8 years ago
- ☆15Nov 23, 2015Updated 10 years ago
- Concurrent network scanner for CVE-2015-1635☆10Dec 7, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆24Mar 3, 2020Updated 6 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆23Jun 26, 2022Updated 3 years ago
- A collection of SolarWinds SWQL examples☆10Mar 18, 2021Updated 5 years ago
- ☆11Aug 4, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This project has been moved from a private repository.☆11May 4, 2018Updated 8 years ago
- My utils written for Reverse Engineering, mainly in python☆49Feb 11, 2014Updated 12 years ago
- Libnids is an implementation of an E-component of Network Intrusion Detection System. It emulates the IP stack of Linux 2.0.x. Libnids of…☆53Feb 28, 2016Updated 10 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Meeting notes☆14Apr 5, 2016Updated 10 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago