embedi / tcl_shellcodeLinks
A template project for creating a shellcode for the Cisco IOS in the C language
☆34Updated 8 years ago
Alternatives and similar repositories for tcl_shellcode
Users that are interested in tcl_shellcode are comparing it to the libraries listed below
Sorting:
- Main repository to pull all Cisco related projects.☆15Updated 8 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆78Updated 7 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆41Updated 10 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆16Updated 7 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆28Updated 4 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆77Updated 3 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- ☆24Updated 7 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- PyCommands for Immunity Debugger☆29Updated 12 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Proof of calc for CVE-2019-6453☆50Updated last year
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- ☆11Updated 8 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- ☆20Updated 7 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Updated 6 years ago