filinpavel / whitehat
☆20Updated 5 years ago
Alternatives and similar repositories for whitehat:
Users that are interested in whitehat are comparing it to the libraries listed below
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- lkm rootkit☆15Updated 10 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- A small python module to manipulate Windows Internals Process Monitor PMF Filter files☆15Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- All tools you needed during penetration testing.☆17Updated 7 years ago
- ☆14Updated 8 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 10 years ago
- This is a copy of the Registry Decoder Live repository from Google Code☆9Updated 9 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- A configurable XPath/XML injection testbed☆32Updated 11 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- ☆42Updated 6 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- Yet Another Repetitive Rootkit☆9Updated 11 years ago
- CTF Writeups☆18Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- See here:☆42Updated 12 years ago
- Suite for Information gathering☆12Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago