decalage2 / collisions
Hash collisions and their exploitations
☆9Updated 2 years ago
Alternatives and similar repositories for collisions:
Users that are interested in collisions are comparing it to the libraries listed below
- A collection of tools for debugging Windows application crashes.☆9Updated 2 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- ☆12Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Loading and executing shellcode in C# without PInvoke.☆20Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- A custom SentinelOne USB scanner.☆18Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Golang Shlyuz Implant Implementation☆12Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆16Updated last year
- ☆17Updated last year
- SSDP Service Discovery☆16Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- ☆18Updated last month
- ☆13Updated 3 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago