ZeroMemoryEx / Malware-IOCs
some of my IOCs from malware investigations
☆10Updated 2 years ago
Alternatives and similar repositories for Malware-IOCs:
Users that are interested in Malware-IOCs are comparing it to the libraries listed below
- ☆14Updated last year
- CVE-2023-38831 winrar exploit generator and get reverse shell☆11Updated last year
- Open Redirect scanner☆18Updated 2 years ago
- Writeups of CTFs i play - this repository will also include POCs, RFCs and Related Resources to support the writeups.☆8Updated 2 years ago
- Osint French People Location☆15Updated 2 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆17Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- ☆12Updated 4 years ago
- A really good cybersec reading materials.☆13Updated 2 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆20Updated 2 years ago
- The Hack3r News B'darija☆18Updated 2 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆20Updated 2 years ago
- A tool that encrypt and hide your data inside your images.☆30Updated 3 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated last year
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- TightVNC Vulnerability.☆16Updated 3 years ago
- The Hacking Week☆2Updated 2 years ago
- Runs sshd as a unprivileged user for persistence☆12Updated 5 years ago
- CVE's we discovered along the way☆16Updated 3 years ago
- GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit☆34Updated last month
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- A swiss army knife for pentesting networks☆25Updated 2 years ago
- Bypass Malware Time Delays☆100Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆27Updated 4 months ago
- An offensive security framework for writing payloads☆16Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- miscellaneous sploit scripts/hacks☆16Updated last month