EgeBalci / KPOT-Decryptor
Tool for finding KPOT XOR key using known-plaintext attack.
☆13Updated 4 years ago
Alternatives and similar repositories for KPOT-Decryptor:
Users that are interested in KPOT-Decryptor are comparing it to the libraries listed below
- Brute-force script for finding azorult XOR key.☆14Updated 5 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- Telegram notification for metasploit sessions.☆14Updated 6 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- ☆16Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- module for certexfil☆15Updated 2 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- My Shellcode Archive☆28Updated 8 years ago
- ☆17Updated 4 years ago
- ☆25Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- Fuzzing Framework☆10Updated 7 years ago
- Discover MSSQL Instances via UDP Scanning☆25Updated 6 years ago
- A simple reflective dll example☆19Updated 8 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- ☆12Updated 8 years ago
- ☆10Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago