UAC 0Day all day!
☆57Aug 15, 2017Updated 8 years ago
Alternatives and similar repositories for defcon25_uac_workshop
Users that are interested in defcon25_uac_workshop are comparing it to the libraries listed below
Sorting:
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- fork from http://hashlib.codeplex.com☆12Oct 27, 2025Updated 4 months ago
- ☆12Dec 26, 2017Updated 8 years ago
- Windows aero overlay with Direct2D & DirectWrite support☆11May 1, 2016Updated 9 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 8 years ago
- Just another tool to download specify Symbol (.pdb) files☆39Sep 4, 2019Updated 6 years ago
- modzero DNS Masquerading Server for Windows☆46May 23, 2018Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Jul 27, 2017Updated 8 years ago
- An EFI image parser and dissector☆52Mar 20, 2013Updated 12 years ago
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- ☆234Sep 10, 2017Updated 8 years ago
- Simple NTFS crawler.☆57Aug 3, 2017Updated 8 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- ARMv7 detour function for hooking junk (no thumb support, unaligned accesses are not atomic)☆16Feb 5, 2017Updated 9 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- A repository of example plugins for Relyze Desktop.☆34Apr 17, 2020Updated 5 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Sep 13, 2017Updated 8 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago