Taggant System developed by the Malware Working Group of ICSG (Industry Connections Security Group) under the umbrella of IEEE
☆34Jan 10, 2018Updated 8 years ago
Alternatives and similar repositories for IEEE_Taggant_System
Users that are interested in IEEE_Taggant_System are comparing it to the libraries listed below
Sorting:
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 12 years ago
- Automatically exported from code.google.com/p/webrtc4all☆15Mar 23, 2015Updated 10 years ago
- PowerShell Utilities for Security Situational Awareness☆13Jan 10, 2017Updated 9 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Landing page for MAEC docs☆22Oct 22, 2022Updated 3 years ago
- ☆18Oct 12, 2014Updated 11 years ago
- experiments in SDR-based pseudo-doppler direction finding☆24Jan 9, 2023Updated 3 years ago
- CAPE monitor DLLs☆42Dec 3, 2019Updated 6 years ago
- A tool for aiding Win32 C development using WINDOWSX.H message crackers☆20Sep 17, 2024Updated last year
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Lightweight WINAPI tracing with Pin☆27Aug 22, 2019Updated 6 years ago
- Various tools, trainers and utilities created by Code Breaker during 1992-1995.☆28May 29, 2022Updated 3 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Dec 25, 2018Updated 7 years ago
- Modified edition of cuckoomon☆51Jun 4, 2018Updated 7 years ago
- A cross-platform library for verifying Authenticode signatures☆163Nov 24, 2025Updated 3 months ago
- MSTSC Packet Dump Utility☆30Feb 11, 2022Updated 4 years ago
- This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main …☆28Jul 24, 2017Updated 8 years ago
- A tool to pin app's icon to taskbar on win10☆29Aug 26, 2023Updated 2 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 11 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Apr 19, 2018Updated 7 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- ☆34Feb 26, 2015Updated 11 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Sep 8, 2020Updated 5 years ago
- ☆82Jul 5, 2016Updated 9 years ago
- Simple DLL injector in Rust☆14Aug 16, 2025Updated 6 months ago
- headless-ida-mcp-server☆29Apr 4, 2025Updated 10 months ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Mar 24, 2014Updated 11 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆35May 27, 2016Updated 9 years ago
- Example/starter code for custom Windows application compatibility shims☆38Dec 27, 2020Updated 5 years ago
- ☆100Jun 19, 2024Updated last year
- ARticated; An augmented reality application for Android☆10Apr 10, 2023Updated 2 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago