Exploit Research & Development - Ported Exploits
☆11Jul 22, 2017Updated 8 years ago
Alternatives and similar repositories for Exploit-Research-Ported
Users that are interested in Exploit-Research-Ported are comparing it to the libraries listed below
Sorting:
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated 10 months ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 11 years ago
- 微软7月布丁增加内存延 迟释放机制☆11Jul 19, 2014Updated 11 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- C# web scraper which targets chaturbate.com☆12Sep 14, 2018Updated 7 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 7 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- Java hex viewer component☆20Mar 4, 2011Updated 14 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 4 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- ☆16Dec 31, 2016Updated 9 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Anotações, roadmaps, dicas e guia de pentest.☆11Jan 13, 2022Updated 4 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- A proxy service that translates http requests to nats messages☆20Nov 21, 2024Updated last year
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 8 months ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- ☆16Mar 6, 2019Updated 6 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- CVE-2017-11882 File Generator PoC☆35Nov 22, 2017Updated 8 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago