bittorrent3389 / cve-2016-0728Links
a exploit for cve-2016-0728
☆7Updated 9 years ago
Alternatives and similar repositories for cve-2016-0728
Users that are interested in cve-2016-0728 are comparing it to the libraries listed below
Sorting:
- AAC File Formats Fuzzing for Mobile Browsers☆9Updated 10 years ago
- elfcrypter is a free, open source, ELF ( Executable and Linkable Format ) software protector, written in C/C++ and Assembler. Support for…☆28Updated 11 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- CVE & others☆18Updated 6 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- A Wordpress Exploitation Toolkit☆15Updated 7 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Rootkit☆21Updated 10 years ago
- Shellcode tracer☆15Updated 9 years ago
- A minimalistic packer designed to pack executables. Useful to compress executables or hide malware from early detection☆9Updated 9 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- ☆10Updated 9 years ago
- just a basic rootkit for learning how to playing sys_call_table☆14Updated 8 years ago
- C code metamorphic obfuscator☆14Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- Dumps TeamViewer ID,Password and account settings from a running TeamViewer instance by enumerating child windows.☆45Updated 2 years ago
- ☆8Updated 9 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Updated 11 years ago
- UAC Copy Tool☆9Updated 9 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- ☆19Updated 11 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- Rootkit Arsenal 2nd Source Code☆14Updated 11 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- OpenType font file format fuzzer for Windows☆52Updated 12 years ago