eelsivart / SearchForCC
☆18Updated 11 years ago
Alternatives and similar repositories for SearchForCC
Users that are interested in SearchForCC are comparing it to the libraries listed below
Sorting:
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 9 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Carve shellcode within the memory using restrictive character set☆8Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- ☆65Updated 8 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- Automatically exported from code.google.com/p/ioctlbf☆16Updated 10 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Fake msxfs.dll to debug ATM trojans☆52Updated 9 years ago
- Ring3 Rootkit Backdoor.☆41Updated 9 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 7 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- CANAPE Network Testing Tool☆34Updated 6 years ago
- Miscellaneous projects related to attacking Windows.☆28Updated 5 years ago