Usefull snippets / Computer-security oriented
☆20Apr 20, 2017Updated 8 years ago
Alternatives and similar repositories for snippets
Users that are interested in snippets are comparing it to the libraries listed below
Sorting:
- Elevation by environment variable expansion☆64Nov 24, 2016Updated 9 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- A C polymorphic and metamorphic engine☆74Jan 24, 2019Updated 7 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 9 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- PoC for an adaptive parallelised DNS prober☆44Oct 4, 2017Updated 8 years ago
- ☆22Mar 5, 2018Updated 8 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- Load a Windows Kernel Driver☆94Jun 7, 2017Updated 8 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- random powershell goodness☆460Nov 21, 2024Updated last year
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 9 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- ☆12May 9, 2017Updated 8 years ago
- A simple tool to manipulate window objects in Windows☆45Dec 22, 2016Updated 9 years ago
- Slides, papers, etc☆33Mar 26, 2024Updated last year
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Sep 20, 2011Updated 14 years ago
- Simple tool that allows add custom function (with custom dll) to PE-file import section☆11Apr 23, 2019Updated 6 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- ☆36Sep 5, 2017Updated 8 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago