Xyl2k / bLaCk-eye-RSA-Attacking-Toolkit-v0.1f-compiledLinks
The great RSA Attacking Toolkit compiled for Windows
☆17Updated 9 years ago
Alternatives and similar repositories for bLaCk-eye-RSA-Attacking-Toolkit-v0.1f-compiled
Users that are interested in bLaCk-eye-RSA-Attacking-Toolkit-v0.1f-compiled are comparing it to the libraries listed below
Sorting:
- RIG Exploit Kit (front end)☆30Updated 10 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Updated 9 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 11 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- Shellcode tracer☆15Updated 9 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- Fake msxfs.dll to debug ATM trojans☆55Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Updated 4 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆30Updated 9 years ago
- ☆22Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Updated 11 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Fuzzing Framework☆10Updated 8 years ago
- ☆43Updated 7 years ago
- Making shellcode UD - https://osandamalith.com☆25Updated 9 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 11 years ago
- PyCommands for Immunity Debugger☆29Updated 12 years ago
- ☆28Updated 9 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- Format string exploit generation☆10Updated 10 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆61Updated 10 years ago