Post Exploitation Linux Toolkit
☆33Oct 19, 2016Updated 9 years ago
Alternatives and similar repositories for PELT
Users that are interested in PELT are comparing it to the libraries listed below
Sorting:
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Dec 16, 2020Updated 5 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Enumerates very, very large directories quickly by directly using kernel syscalls. For POSIX and Windows. WARNING THIS IS OBSOLETE. USE B…☆15Aug 13, 2014Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 7 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- Using Deviare to Cheat on Games: Intercepting Direct3D COM objects and making walls invisible☆13Jul 1, 2013Updated 12 years ago
- A(nother) Binary Analysis Framework☆30Jun 10, 2014Updated 11 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Simple .Net hooking library☆31Jan 19, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Jan 24, 2016Updated 10 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago