☆23Jan 18, 2018Updated 8 years ago
Alternatives and similar repositories for POC
Users that are interested in POC are comparing it to the libraries listed below
Sorting:
- ☆11Jan 16, 2018Updated 8 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- ☆13Aug 31, 2024Updated last year
- Exploits for various CVEs☆11Mar 19, 2022Updated 4 years ago
- 自己零零散散研究以及收集的一些免杀技巧,以便为后续查阅,拓宽思路☆15Dec 11, 2019Updated 6 years ago
- Python library for CPGQL server☆41Jun 4, 2024Updated last year
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆12May 17, 2023Updated 2 years ago
- VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump☆24Jul 6, 2023Updated 2 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- ☆12Oct 29, 2018Updated 7 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- 国密算法sm1,sm2,sm3,sm4算法源码☆12Feb 19, 2018Updated 8 years ago
- CVE-2017-11882 exploitation☆44Nov 28, 2017Updated 8 years ago
- ☆14Nov 16, 2020Updated 5 years ago
- Joomla 未授权访问漏洞 CVE-2023-23752☆12Mar 3, 2023Updated 3 years ago
- 一个protobuf二进制反解析的工具,用于微信数据库中聊天记录和朋友圈等以protobuf格式保存的数据解析。☆18Aug 19, 2017Updated 8 years ago
- Something To Do Android Application Security Research☆10May 14, 2021Updated 4 years ago
- SM4的优化实现,比官网上的实现快5-6倍☆13May 29, 2019Updated 6 years ago
- A Modified version of TCC's Osprey poc framework......☆13Jan 4, 2022Updated 4 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- minihttp by libcurl, support https.☆15Oct 12, 2019Updated 6 years ago
- ☆11Nov 11, 2016Updated 9 years ago
- 在学习信息安全的过程中收集的文件与信息。☆22Aug 21, 2017Updated 8 years ago
- ☆10Jul 19, 2016Updated 9 years ago
- Web-based terminal emulator for docker containers☆21Mar 21, 2017Updated 9 years ago
- ASLR Disabler (x86 / x64) - Little utility for disabling the ASLR on PE files☆16Aug 1, 2023Updated 2 years ago
- Generative Adversarial Network to generate malware to evade detection☆15Mar 25, 2023Updated 2 years ago
- ☆18Mar 31, 2025Updated 11 months ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- My replication of the paper "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"☆16Apr 27, 2020Updated 5 years ago
- ☆12May 2, 2017Updated 8 years ago
- ☆12May 6, 2020Updated 5 years ago
- Web在线菜刀☆19Oct 18, 2017Updated 8 years ago
- 备份文件信息泄露脚本与字典☆16Sep 8, 2021Updated 4 years ago
- Packer scripts for building cloud-automatation-friendly Firefly images☆21Mar 27, 2015Updated 10 years ago
- python-shellcode加载器☆11Oct 28, 2019Updated 6 years ago