eelsivart / SearchForCCLinks
☆18Updated 11 years ago
Alternatives and similar repositories for SearchForCC
Users that are interested in SearchForCC are comparing it to the libraries listed below
Sorting:
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- ~ BannerGrab☆26Updated 8 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- RIG Exploit Kit (front end)☆30Updated 10 years ago
- library to decode/parse zeus-like configuration files☆29Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Miscellaneous projects related to attacking Windows.☆28Updated 6 years ago
- Exploit Reliability Testing System☆34Updated 10 years ago
- Various tools, exploits and other short code snippets☆12Updated 6 years ago
- ☆24Updated 6 years ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago
- Fake msxfs.dll to debug ATM trojans☆52Updated 9 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- My metasploit modules☆23Updated 9 years ago
- Ring3 Rootkit Backdoor.☆41Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Carve shellcode within the memory using restrictive character set☆9Updated 7 years ago