A sample of proof of concept scripts that run Calc.exe with full source code.
☆97Sep 4, 2024Updated last year
Alternatives and similar repositories for calc_security_poc
Users that are interested in calc_security_poc are comparing it to the libraries listed below
Sorting:
- (shard of furikuri project) assambler for code obfuscation☆19Oct 29, 2019Updated 6 years ago
- System Security Project☆13Feb 28, 2017Updated 9 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- ObscurityLabs RedTeam C# Toolkit☆122Sep 3, 2019Updated 6 years ago
- ☆20Feb 23, 2019Updated 7 years ago
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- May the POC be with you☆65Feb 21, 2026Updated 2 weeks ago
- Artemis - C++ Hell's Gate Syscall Implementation☆34Aug 16, 2023Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- just test☆66Oct 8, 2022Updated 3 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Feb 2, 2023Updated 3 years ago
- ☆37Dec 27, 2021Updated 4 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Oct 30, 2019Updated 6 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- C Header Only Library for Virii☆11Nov 17, 2020Updated 5 years ago
- ☆43Nov 5, 2018Updated 7 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆10Dec 29, 2021Updated 4 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- Some anti-sandbox codes, copy directly to strengthen your own ShellCode☆12Dec 26, 2022Updated 3 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- PoC for hiding data within $MFT☆12Aug 14, 2014Updated 11 years ago
- ☆12Aug 16, 2022Updated 3 years ago
- A sub-domain reconnaissance written in golang☆12Jan 11, 2018Updated 8 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆513Sep 23, 2020Updated 5 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 2 months ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated 3 weeks ago
- experimenting w/ apple script for various macOS functionality☆15Aug 4, 2019Updated 6 years ago