Scripts created by MRG Effitas
☆42Nov 22, 2016Updated 9 years ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below
Sorting:
- ☆16Jan 31, 2015Updated 11 years ago
- ☆21Aug 7, 2014Updated 11 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated last month
- Mass Triage Tools☆20Mar 10, 2026Updated last week
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- ELF header abuse☆50Mar 23, 2016Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 11 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Passive DNS V2☆60Mar 27, 2014Updated 11 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Feb 16, 2015Updated 11 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- This is an automatic SQL Injection tool called as FatCat , Use of FatCat for testing your web application and exploit your application m…☆18Oct 22, 2015Updated 10 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- Procmonel is Procmon like monitoring system implemented using Microsoft WDK☆13Dec 25, 2019Updated 6 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 11 years ago
- Kernel (Ring0) - SSDT unhook driver☆14Feb 22, 2018Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- FRAC and RIFT☆17Mar 16, 2019Updated 7 years ago
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 3 years ago
- The LogParserPlus application, which uses Microsoft's Log Parser.☆12Jul 30, 2017Updated 8 years ago