Mixing up CVE and MS like a pro
☆25Mar 27, 2017Updated 8 years ago
Alternatives and similar repositories for ms17-0100
Users that are interested in ms17-0100 are comparing it to the libraries listed below
Sorting:
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆60Mar 28, 2017Updated 8 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Remote Java classpath enumeration via deserialization☆22May 23, 2023Updated 2 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Powershell VNC injector☆341Jun 29, 2020Updated 5 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆319Dec 29, 2017Updated 8 years ago
- ☆79May 13, 2016Updated 9 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Underhanded PowerShell Contest Repository☆18May 5, 2016Updated 9 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- ☆96Jul 10, 2018Updated 7 years ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Feb 23, 2026Updated last week
- Материалы к статье "Препарируем Hyper V"☆14Nov 5, 2014Updated 11 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆105Jul 2, 2017Updated 8 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- Materials of Workshop presented at DEFCON 25☆107Jul 29, 2017Updated 8 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Terminal Service (RDP) Security Editor☆52Jun 7, 2017Updated 8 years ago