Breaking the security of Microsoft's RMS
☆56Aug 5, 2019Updated 6 years ago
Alternatives and similar repositories for MS-RMS-Attacks
Users that are interested in MS-RMS-Attacks are comparing it to the libraries listed below
Sorting:
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- ☆30Sep 1, 2022Updated 3 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Jul 22, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- This is a tool to instantly test if an application handles SSL certificates the way it is supposed to.☆25Mar 17, 2023Updated 3 years ago
- OWASP Findings Format☆19Mar 4, 2021Updated 5 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- ☆23Apr 8, 2015Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆44Jun 29, 2017Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- Various shell code I have written☆17Oct 9, 2020Updated 5 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- ☆32Jun 19, 2024Updated last year
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago