GeorgeArgyros / SnowflakeView external linksLinks
Snowflake is a tool for exploiting randomness vulnerabilities by seed recovery attacks targetting the rand() and mt_rand() generators in PHP applications.
☆83Aug 1, 2017Updated 8 years ago
Alternatives and similar repositories for Snowflake
Users that are interested in Snowflake are comparing it to the libraries listed below
Sorting:
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- PHP obfuscator written in Javascript.☆14Oct 8, 2021Updated 4 years ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.☆18Jan 29, 2018Updated 8 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- Tools, documentation and test inputs for fuzzing opensource projects with AddressSanitizer and friends.☆29Sep 24, 2015Updated 10 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- ☆32Aug 5, 2015Updated 10 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Alternative hexdump.☆15Feb 4, 2016Updated 10 years ago
- ☆20Mar 21, 2024Updated last year
- An online IRC system based on Web.py~☆20Mar 27, 2015Updated 10 years ago
- A python-based padding oracle tool☆20Aug 14, 2024Updated last year
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Slides and demos☆48Mar 24, 2015Updated 10 years ago
- ☆17Aug 4, 2014Updated 11 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Jan 22, 2016Updated 10 years ago
- A collection of Binary Ninja plugins☆28May 17, 2022Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- A reference of the different types of access control card readers and which countries they're commonly found in☆18Oct 19, 2022Updated 3 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs☆22May 12, 2020Updated 5 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Example of using Windows Platform Binary Table (WPBT)☆27Jul 9, 2023Updated 2 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago
- asp命令执行webshell☆19Oct 27, 2014Updated 11 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 10 years ago
- java unserialize vulnerability payload☆21Apr 20, 2019Updated 6 years ago
- A lightweight batch scanning framework based on gevent.☆48Jun 22, 2018Updated 7 years ago