EgeBalci / KPOT-Decryptor
Tool for finding KPOT XOR key using known-plaintext attack.
☆13Updated 4 years ago
Alternatives and similar repositories for KPOT-Decryptor:
Users that are interested in KPOT-Decryptor are comparing it to the libraries listed below
- Brute-force script for finding azorult XOR key.☆14Updated 5 years ago
- Liberating dem proprietary APT implants☆21Updated 5 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- ☆24Updated 6 years ago
- Telegram notification for metasploit sessions.☆14Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- ☆16Updated 5 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- module for certexfil☆15Updated 2 years ago
- ☆25Updated 6 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆58Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago
- ☆12Updated 8 years ago
- ☆43Updated 5 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 3 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆18Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- ☆15Updated 4 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- edge --> powerpoint --> remote-file --> shell☆13Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- CVE-2020-0688☆10Updated 4 years ago
- Malware vulnerability research. Coming soon..☆12Updated 4 years ago