DimitriFourny / snippetsLinks
Usefull snippets / Computer-security oriented
☆20Updated 8 years ago
Alternatives and similar repositories for snippets
Users that are interested in snippets are comparing it to the libraries listed below
Sorting:
- POC for IAT Parsing Payloads☆48Updated 9 years ago
- A framework for creating modular bots/backdoors☆21Updated 10 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- ☆74Updated 3 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Updated 7 years ago
- ☆52Updated 10 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- BlackHat Europe 2017 Slides☆25Updated 7 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Updated 8 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 9 years ago
- An offensive Powershell console☆30Updated 10 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Create custom Windows batch files from a configuration file☆32Updated 9 years ago
- CANAPE Network Testing Tool☆33Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- ☆59Updated 6 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 6 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Updated 9 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 7 years ago
- ~ BannerGrab☆25Updated 9 years ago