TDiffff / Pwnsy
Penetration Testing Tool for Windows 7 => 10
☆15Updated 6 years ago
Alternatives and similar repositories for Pwnsy:
Users that are interested in Pwnsy are comparing it to the libraries listed below
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Updated 7 years ago
- Zerokit shared code☆16Updated 6 years ago
- Common Malware Techniques☆13Updated 2 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- User-mode part of Zerokit platform☆20Updated 6 years ago
- Zerokit server controller☆13Updated 6 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- Capture Webcam Reflective Dll☆8Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It c…☆7Updated 8 years ago
- ☆10Updated 10 years ago
- ☆11Updated 6 years ago
- ☆24Updated 9 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- Ip Transmitter.☆7Updated 8 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆10Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Performance Monitor Volatile Environment LPE☆18Updated 4 months ago
- Code Injector Using Code Caves☆14Updated 9 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 7 months ago
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 6 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- Component Services Volatile Environment LPE☆11Updated 4 months ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago