a1ext / Windows-Exploit-SuggesterLinks
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. Supports Python 3!
☆15Updated 4 years ago
Alternatives and similar repositories for Windows-Exploit-Suggester
Users that are interested in Windows-Exploit-Suggester are comparing it to the libraries listed below
Sorting:
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Updated 5 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- From directory deletion to SYSTEM shell☆111Updated 5 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- ☆37Updated 11 months ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆75Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 4 months ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆21Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 6 months ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆140Updated 3 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated 2 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago
- AMSI detection PoC☆31Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago