PokemonGoTeam / CRYPTOPOKEMONView external linksLinks
Simple C++ cryptolocker Blowfish CBC
☆18Apr 13, 2019Updated 6 years ago
Alternatives and similar repositories for CRYPTOPOKEMON
Users that are interested in CRYPTOPOKEMON are comparing it to the libraries listed below
Sorting:
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- ☆10Jun 26, 2024Updated last year
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Feb 13, 2017Updated 9 years ago
- Reverse TCP Python Framework☆25Nov 7, 2017Updated 8 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- CVE-2018-4407 IOS/macOS kernel crash☆13Feb 23, 2019Updated 6 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- ☆14May 17, 2018Updated 7 years ago
- ☆11May 13, 2019Updated 6 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆19Mar 31, 2025Updated 10 months ago
- ☆37Dec 10, 2018Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Linux AV tests☆13Apr 23, 2019Updated 6 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54May 11, 2021Updated 4 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆32Aug 20, 2018Updated 7 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆20Mar 4, 2024Updated last year
- 基于深度学习的cms识别 训练集☆16Sep 22, 2018Updated 7 years ago
- The Rainbow Parser☆17Mar 5, 2018Updated 7 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- Splunk Technology Add-On (TA) for collecting ETW events from Windows systems☆17Dec 8, 2022Updated 3 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- An android spying application☆38Jul 25, 2018Updated 7 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- UAC bypass and Elevate☆14Sep 24, 2016Updated 9 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- smbtouch多线程检测☆16Jul 20, 2017Updated 8 years ago
- htcap is a web application scanner able to crawl single page application (SPA) in a recursive manner by intercepting ajax calls and DOM c…☆18Sep 23, 2025Updated 4 months ago