TDiffff / PwnsyLinks
Penetration Testing Tool for Windows 7 => 10
☆15Updated 6 years ago
Alternatives and similar repositories for Pwnsy
Users that are interested in Pwnsy are comparing it to the libraries listed below
Sorting:
- Kernel mode windows NT API logger☆22Updated 5 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Updated 7 years ago
- Zerokit server controller☆14Updated 6 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- Zerokit shared code☆17Updated 6 years ago
- Capture Webcam Reflective Dll☆8Updated 9 years ago
- Remote Assistance Volatile Environment LPE☆15Updated 3 weeks ago
- Common Malware Techniques☆13Updated 2 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- ☆12Updated 8 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- Performance Monitor Volatile Environment LPE☆18Updated 3 weeks ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago
- Code injection via delay load libraries☆35Updated 7 years ago
- Bare Knuckled AV Breaking☆57Updated 6 years ago
- ☆23Updated 9 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- Ip Transmitter.☆7Updated 9 years ago
- Dodgy reflective DLL injector PoC for 32-bit Windows☆16Updated 6 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It c…☆7Updated 8 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Ring3 Rootkit Backdoor.☆42Updated 9 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- Web Based Crypter☆7Updated 11 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- ☆18Updated 7 years ago
- Sysprep Volatile Environment LPE (2017)☆15Updated 3 weeks ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Updated 5 years ago