MS17-010 Tester
☆13May 20, 2017Updated 8 years ago
Alternatives and similar repositories for MS17010Test
Users that are interested in MS17010Test are comparing it to the libraries listed below
Sorting:
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- ☆12Aug 28, 2017Updated 8 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Mar 18, 2023Updated 2 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 9 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Windows inject☆16Jun 7, 2018Updated 7 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- ART环境下自动化脱壳方案☆17Jun 2, 2020Updated 5 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- Attempt at recreating a windows-based DKOM rootkit using c#☆12Sep 11, 2016Updated 9 years ago
- ☆15Feb 9, 2018Updated 8 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Feb 20, 2021Updated 5 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 3 years ago
- Example to execute code in a remote process using wndproc trick☆16Apr 2, 2017Updated 8 years ago
- Overwrite a process's recovery callback and execute with WER☆102Apr 17, 2022Updated 3 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- ☆21Jul 18, 2017Updated 8 years ago
- A cross-platform remote administration tool written in Java☆19Aug 26, 2020Updated 5 years ago
- Compresses .NET executables and merges dlls into a standalone, smaller executable.☆51Oct 24, 2019Updated 6 years ago
- A cloud based remote android managment suite, powered by NodeJS☆28Dec 12, 2022Updated 3 years ago
- ☆19Mar 21, 2020Updated 5 years ago
- A simple rootkit to hide a process☆47Jan 10, 2014Updated 12 years ago
- Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).☆21Mar 1, 2019Updated 6 years ago
- CVE-2020-9547:FasterXML/jackson-databind 远程代码执行漏洞☆23Mar 2, 2020Updated 5 years ago
- Just an older botnet☆19Jun 12, 2020Updated 5 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Exploit the vulnerability to execute the calculator☆68Jan 11, 2018Updated 8 years ago
- Example implementations of each attribute available in Nunit2 unit Testing Framework using C# .NET.☆15Jun 1, 2018Updated 7 years ago
- a very basic proxy obfuscator based on dnlib☆21Jul 3, 2018Updated 7 years ago