a1ext / Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. Supports Python 3!
☆15Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Windows-Exploit-Suggester
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 4 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- ☆20Updated 4 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated 9 months ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆42Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- Here are some of my malware reversing papers that I will be publishing☆31Updated 2 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆45Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 2 months ago
- ☆24Updated 3 years ago
- Python 3 server used to control SK8RAT implant☆34Updated 3 years ago
- Dumping credentials through windbg and pykd☆38Updated last year
- ☆22Updated 5 months ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 2 years ago
- Rekall Memory Forensic Framework☆29Updated 5 years ago
- A collection of shellcode hashes☆17Updated 6 years ago