aurel26 / s-4-u-for-windowsView external linksLinks
s(4)u for Windows
☆48Dec 8, 2020Updated 5 years ago
Alternatives and similar repositories for s-4-u-for-windows
Users that are interested in s-4-u-for-windows are comparing it to the libraries listed below
Sorting:
- WER Server☆19Feb 26, 2017Updated 8 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- Terminal Service (RDP) Security Editor☆49Jun 7, 2017Updated 8 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- Simple standalone bundle of NT core APIs☆25Mar 7, 2016Updated 9 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- Python object inspector☆16Sep 5, 2022Updated 3 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago
- googleusercontent.com as HTTP(S) proxy☆54Sep 12, 2020Updated 5 years ago
- A hex/binary black box analysis tool☆13Aug 31, 2016Updated 9 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Jul 17, 2013Updated 12 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Aug 19, 2018Updated 7 years ago
- gpocheck☆30Aug 11, 2024Updated last year
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- XXE OOB Exploitation Toolset for Automation☆63Jan 20, 2014Updated 12 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- an open source toolkit for PCI bus exploration☆72Dec 18, 2016Updated 9 years ago
- Dumps TeamViewer ID,Password and account settings from a running TeamViewer instance by enumerating child windows.☆45Sep 5, 2022Updated 3 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated this week
- TLS SNI virtual hosts bruteforcer☆21Aug 26, 2014Updated 11 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- McAfee ePolicy 0wner exploit code☆46Oct 11, 2018Updated 7 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- A Bayesian Method for the Induction of Probalistic Networks from Data☆19Jul 6, 2017Updated 8 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- Python wrapper for http://nacl.cace-project.eu/☆30Nov 8, 2021Updated 4 years ago
- ☆164Aug 28, 2015Updated 10 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated last month
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 10 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago