Tools I wrote for personal use in C, Python, Powershell, Bash, ...
☆46Dec 14, 2018Updated 7 years ago
Alternatives and similar repositories for misc
Users that are interested in misc are comparing it to the libraries listed below
Sorting:
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- Elf checksec in Go.☆14May 10, 2022Updated 3 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago
- https://exploit-exercises.com/fusion/☆20Dec 29, 2015Updated 10 years ago
- Misery Loader to bypass modern EDR solutions☆15Dec 20, 2024Updated last year
- RSHack - Tool for RSA CTF's challenges☆98Nov 19, 2018Updated 7 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- ☆15Mar 24, 2016Updated 9 years ago
- Personal scripts for binary ninja☆26Jul 24, 2019Updated 6 years ago
- Shellcode Of Death☆43Aug 31, 2013Updated 12 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Jun 29, 2016Updated 9 years ago
- ELF header abuse☆50Mar 23, 2016Updated 9 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- Some examples of anti debug techniques used in malware or commercial products preventing analysts to debug code of app.☆22Apr 18, 2020Updated 5 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆28Feb 4, 2026Updated last month
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Jun 26, 2022Updated 3 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Jun 27, 2019Updated 6 years ago
- Safe Rust bindings to the DynamoRIO dynamic binary instrumentation framework.☆21Mar 8, 2025Updated last year
- The Ultimate Guide to Pwning☆59Apr 4, 2018Updated 7 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆133Oct 1, 2023Updated 2 years ago
- Obfuscate specific windows apis with different apis☆12Jul 31, 2024Updated last year
- Une API Python pour JVC !☆12Dec 7, 2023Updated 2 years ago
- Code of paper "EnclaveFuzz: Finding Vulnerabilities in SGX Applications"☆26Jan 1, 2026Updated 2 months ago
- Kernel exploits and writeups☆17May 11, 2022Updated 3 years ago
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Aug 10, 2019Updated 6 years ago
- Patch AMSI and ETW in remote process via direct syscall☆85Apr 28, 2022Updated 3 years ago
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 9 years ago
- fastjson_rce工具,不用搭建HTTP服务,不受JDK版本限制☆10Nov 25, 2019Updated 6 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- ☆14Nov 29, 2019Updated 6 years ago
- A RogueLike by S01den☆16Jun 13, 2020Updated 5 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- Changes MDM registry keys without the need for an MDM server to quickly disable WiFi-Sense and handle other potential security concerns i…☆15Aug 10, 2015Updated 10 years ago