☆32Feb 7, 2018Updated 8 years ago
Alternatives and similar repositories for Secist_Applocker
Users that are interested in Secist_Applocker are comparing it to the libraries listed below
Sorting:
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Apr 9, 2019Updated 6 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- ☆20Feb 5, 2026Updated 3 weeks ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Random Scripts and Tools☆14Mar 29, 2022Updated 3 years ago
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆17Feb 9, 2025Updated last year
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 6 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- ☆34Jan 1, 2019Updated 7 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- 使用JAVAFX图形化界面检测对HVV中常见的重点CMS系统和OA系统的已公开的漏洞进行验证。☆15Jul 15, 2022Updated 3 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Mar 25, 2021Updated 4 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Nov 29, 2017Updated 8 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆105Jul 2, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- A CUI Struts2 Vulnerability Exploit☆16Jul 29, 2016Updated 9 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Mar 8, 2018Updated 7 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆162Apr 11, 2017Updated 8 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Jun 18, 2018Updated 7 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- ☆78Feb 19, 2017Updated 9 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- Windows Shortcut file (LNK) parser☆137Nov 17, 2022Updated 3 years ago
- Example DLL to load from Windows NetShell☆182Sep 26, 2016Updated 9 years ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆33Aug 18, 2025Updated 6 months ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- The content of this repository aims to assist efforts on analysing inner working principles, functionalities, and properties of the Micro…☆150May 29, 2020Updated 5 years ago