ctxis / canape
CANAPE Network Testing Tool
☆183Updated 7 years ago
Alternatives and similar repositories for canape:
Users that are interested in canape are comparing it to the libraries listed below
- ☆112Updated 7 years ago
- DefCon24☆121Updated 8 years ago
- Differential Analysis of Malware in Memory☆211Updated 7 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆83Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆158Updated 5 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Decept Network Protocol Proxy☆275Updated 2 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆145Updated 9 years ago
- Some scripts for attacks on Tacacs+ protocol☆64Updated 5 years ago
- ☆113Updated 7 years ago
- ☆137Updated 6 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆169Updated 6 years ago
- Small tool for disassembling shellcode (using objdump)☆146Updated 2 years ago
- A powershell script for creating a Windows honeyport.☆87Updated 9 years ago
- rVMI - A New Paradigm For Full System Analysis☆354Updated 7 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- A Python framework for script filing and task sequencing☆26Updated 5 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆122Updated 6 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections☆241Updated 8 years ago
- ☆73Updated 2 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 4 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆161Updated 4 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- A RADIUS authentication server audit tool☆79Updated 6 years ago