Optixal / MalwarePoCLinks
Proof-of-concept malware programs. For educational purpose only.
☆23Updated 9 years ago
Alternatives and similar repositories for MalwarePoC
Users that are interested in MalwarePoC are comparing it to the libraries listed below
Sorting:
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- The Horrific Omnipotent Rootkit☆23Updated 8 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- A tool to help you manage your leaks☆34Updated 8 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- ☆28Updated 9 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18Updated 5 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Projects and POCs☆61Updated 11 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- ☆29Updated this week
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- See here:☆42Updated 12 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- ☆43Updated 7 years ago
- Just a collection of scripts☆40Updated 5 years ago
- ☆42Updated 9 years ago