aydinnyunus / MemoryBladeLinks
MemoryBlade Repository: A comprehensive collection of advanced memory hacking techniques, tools, and resources specifically tailored for enhancing and customizing the gaming experience in Mount and Blade: Warband.
☆14Updated last year
Alternatives and similar repositories for MemoryBlade
Users that are interested in MemoryBlade are comparing it to the libraries listed below
Sorting:
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 6 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- ☆16Updated 2 years ago
- ☆18Updated 6 months ago
- Reverse Shell troll software☆12Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Updated 11 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆15Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- ManageEngine ADManager Command Injection☆11Updated last year
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- ☆17Updated last year
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆20Updated 2 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago