EgeBalci / KPOT-DecryptorLinks
Tool for finding KPOT XOR key using known-plaintext attack.
☆13Updated 5 years ago
Alternatives and similar repositories for KPOT-Decryptor
Users that are interested in KPOT-Decryptor are comparing it to the libraries listed below
Sorting:
- Brute-force script for finding azorult XOR key.☆14Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- ☆33Updated 5 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- ☆24Updated 7 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22Updated 6 years ago
- Fuzzing Framework☆10Updated 7 years ago
- ☆25Updated 7 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 6 years ago
- ☆13Updated 8 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆46Updated 8 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- A simple reflective dll example☆19Updated 8 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- ☆43Updated 5 years ago
- My Shellcode Archive☆28Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆32Updated 7 years ago
- Discover MSSQL Instances via UDP Scanning☆25Updated 6 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago