aidanhs / tclscan
Scans tcl for command injection
☆17Updated 5 years ago
Alternatives and similar repositories for tclscan:
Users that are interested in tclscan are comparing it to the libraries listed below
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 10 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆12Updated 6 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆24Updated 5 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- .NET Binary Deserializer/Serializer - For all formats: [MC-NBFX], [MC-NBFS], [MC-NBFSE]☆18Updated 6 years ago
- XXE attack tool☆31Updated 9 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- Some of the presentations given by me☆18Updated 5 months ago
- ☆17Updated 6 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- GDB command for reattaching to the new instance of the process (help exploit development)☆12Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- python inspect rootkit tool☆34Updated 11 years ago
- ☆10Updated 3 months ago
- CVE-2019-10149 privilege escalation☆9Updated 5 years ago
- Different code-injections techniques under a common tool☆30Updated 4 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- CVE-2019-12949☆26Updated 5 years ago
- ☆26Updated 8 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago