☆43Nov 5, 2018Updated 7 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- CVE-2018-15982_EXP_IE☆12Dec 12, 2018Updated 7 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Miscellanous scripts used for malware analysis☆23Oct 4, 2018Updated 7 years ago
- burp extender for fuzzing☆10Aug 10, 2018Updated 7 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- ☆44Aug 16, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- Autoinstall T-Pot on Ubuntu 16.04☆28Aug 1, 2018Updated 7 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Feb 5, 2021Updated 5 years ago
- ☆12May 9, 2017Updated 8 years ago
- A VBA p-code disassembler☆483Jun 12, 2021Updated 4 years ago
- WebLogic Exploit☆143Jul 13, 2018Updated 7 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- POC for CVE-2018-0824☆88Oct 18, 2022Updated 3 years ago
- cve-2018-2894 不同别人的利用方法。☆15Dec 1, 2025Updated 3 months ago
- 打造一台翻墙路由器,ShadowSocks翻墙,OpenWrt路由器☆11Jan 17, 2016Updated 10 years ago
- ☆16Nov 10, 2018Updated 7 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆19Mar 22, 2019Updated 6 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆120Apr 30, 2019Updated 6 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- 基于360提出的Ghost Tunnel攻击复现☆135Nov 15, 2024Updated last year
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 3 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆96Nov 4, 2021Updated 4 years ago
- ActiveMime File Format Documentation☆19Jun 28, 2021Updated 4 years ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago