Unpacking tool for the zipExec Crypter
☆14Oct 30, 2021Updated 4 years ago
Alternatives and similar repositories for zipExec_unpack
Users that are interested in zipExec_unpack are comparing it to the libraries listed below
Sorting:
- ☆13Jul 24, 2022Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- AntSword Generate Shell Plugin☆12Jun 26, 2022Updated 3 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Jul 13, 2022Updated 3 years ago
- Sample embedded defense code for applications written in .NET, Java, PHP and Python.☆11Feb 23, 2019Updated 7 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Aug 5, 2022Updated 3 years ago
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- Extract passwords from memory with strace☆41Nov 17, 2021Updated 4 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- ☆10Oct 20, 2025Updated 5 months ago
- a Modular web penetration testing interface☆15Feb 20, 2026Updated last month
- Remot Desktop Checker (Au3-Source)☆10Jun 25, 2018Updated 7 years ago
- ☆103Aug 4, 2025Updated 7 months ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- awesome list of browser exploitation tutorials☆13Sep 21, 2018Updated 7 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Code By:Tas9er / F5 BIG-IP 远程命令执行漏洞☆14Mar 29, 2021Updated 4 years ago
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- ☆18Jan 9, 2026Updated 2 months ago
- Writeup and scripts for the 2021 malwarebytes crackme☆11Nov 9, 2021Updated 4 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Webdav Mass Exploiter With Python Programming Language☆13Jul 19, 2025Updated 8 months ago
- The best game bot for mobile game vHack OS. It completely automates your game. So do not hesitate and download and play 24/7 like everyon…☆18Sep 8, 2018Updated 7 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- ☆13Feb 12, 2024Updated 2 years ago
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆10Feb 9, 2023Updated 3 years ago
- CS 61 problem sets for 2020☆12Dec 1, 2020Updated 5 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Oct 8, 2024Updated last year
- Automated Pentest Recon Scanner☆14Jul 29, 2016Updated 9 years ago