Flu, es un proyecto libre nacido con el objetivo de enseñar y concienciar a los usuarios sobre los problemas producidos por el malware, mediante el desarrollo de un caballo de troya educativo que pueda ser explicado sin peligro en formaciones académicas. No nos responsabilizamos de cualquier uso malintencionado que se haga del proyecto, así co…
☆20Feb 10, 2017Updated 9 years ago
Alternatives and similar repositories for flu
Users that are interested in flu are comparing it to the libraries listed below
Sorting:
- ☆11Mar 19, 2019Updated 6 years ago
- Process Hollowing☆12Sep 13, 2017Updated 8 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- ILReplacer, A Tool to Find and Replace .Net Application IL Code Instructions (Patcher)☆22Oct 15, 2019Updated 6 years ago
- S4A main repository. SaltStack states, install script and build scripts☆27Updated this week
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆11Jul 26, 2022Updated 3 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Generic methods for retrying functions and actions in .NET☆10Oct 28, 2019Updated 6 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- initial commit☆44Nov 19, 2024Updated last year
- An Identity Verification App to be used to for KYC purposes☆15Apr 23, 2018Updated 7 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- PPT of my talks.☆13Jun 23, 2025Updated 8 months ago
- So you want to fix a raw .net file manually ? I got it!, Let's fix RVA and Sizes, Relocations, EP, IAT, Metadata Dir, Directory, BSJB, In…☆10Aug 8, 2022Updated 3 years ago
- Go SDK of Malicious Wallet Address Database☆11Apr 9, 2018Updated 7 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- C# library for calling executable files☆10Dec 3, 2018Updated 7 years ago
- fanotify cron system☆21Sep 15, 2015Updated 10 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- A customized version of Ella used in the paper `An Empirical Study of Android Test Generation Tools in Industrial Cases`.☆10Aug 19, 2020Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Realtek Universal Audio Driver with Harman Clari-Fi music restoration APO☆10Dec 12, 2020Updated 5 years ago
- XRPL hook for Evernode.☆11Dec 5, 2024Updated last year
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- A PowerShell script to automatically configure for the highest privacy and control settings in Windows 10.☆10Aug 16, 2024Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago