alexwebr / evilmaid_chkdskView external linksLinks
An bootable 'evil maid' tool that pretends to be Windows CHKDSK
☆80Feb 8, 2019Updated 7 years ago
Alternatives and similar repositories for evilmaid_chkdsk
Users that are interested in evilmaid_chkdsk are comparing it to the libraries listed below
Sorting:
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- A centralized location for all presentations I've given at various conferences☆26Sep 1, 2017Updated 8 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- Bootkits Revisited☆40Jun 3, 2014Updated 11 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- ☆13Aug 18, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Python tools for interacting with a DarkComet Client☆54Aug 4, 2015Updated 10 years ago
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Mar 5, 2012Updated 13 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago