alisaesage / TrainingsLinks
Files related to my training classes
☆16Updated 4 years ago
Alternatives and similar repositories for Trainings
Users that are interested in Trainings are comparing it to the libraries listed below
Sorting:
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆11Updated 7 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Notes and goodies to make binary exploitation life easier☆10Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Containing vulnerabilities I've discovered and maybe CVE☆18Updated 2 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated last year
- ☆15Updated last year
- Execute shellcode with syscalls from C# .dll☆12Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- ☆16Updated 5 years ago
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.☆13Updated 4 years ago
- Sources Codes of many Office Malwares☆17Updated 2 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 5 years ago
- ShellC0de Generator☆11Updated 4 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 3 years ago
- ☆28Updated 7 months ago
- Some Pentesting Scripts☆11Updated 3 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Display Languages Volatile Environment LPE☆10Updated 6 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- ☆13Updated 4 years ago
- ☆7Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago