filinpavel / whitehat
☆20Updated 5 years ago
Alternatives and similar repositories for whitehat:
Users that are interested in whitehat are comparing it to the libraries listed below
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- lkm rootkit☆15Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- FWRF is a open source tool for firmware web-side analysis.☆12Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- Chrome extension for blocking x-origin cookies☆10Updated 8 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 10 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- ☆17Updated 6 years ago
- A small python module to manipulate Windows Internals Process Monitor PMF Filter files☆15Updated 6 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- UAC Copy Tool☆9Updated 9 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- ☆14Updated 9 years ago
- drivesploit-testing☆26Updated 14 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 4 months ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 3 years ago
- See here:☆42Updated 12 years ago
- Python library for image hashing and deduplication☆11Updated 9 years ago