My IDA scripts, tips and testing techniques for Thick Client applications.
☆17Jun 19, 2014Updated 11 years ago
Alternatives and similar repositories for ThickClientScripts
Users that are interested in ThickClientScripts are comparing it to the libraries listed below
Sorting:
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆169Feb 29, 2016Updated 9 years ago
- Fault injection library☆22Dec 2, 2014Updated 11 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- ☆18Feb 20, 2019Updated 7 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 11 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆113Nov 19, 2024Updated last year
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 2 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago