☆10Oct 8, 2015Updated 10 years ago
Alternatives and similar repositories for NetUSB-exploit
Users that are interested in NetUSB-exploit are comparing it to the libraries listed below
Sorting:
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- ☆10Mar 30, 2015Updated 10 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- A scriptable debugger library to interact with Android applications☆46Sep 27, 2013Updated 12 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Automated GUI testing utility developed for Marvin-dynamic-analyzer.☆16Feb 17, 2016Updated 10 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- ☆42May 10, 2016Updated 9 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Mar 4, 2016Updated 9 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- Remote kernel exploit for ROSE amateur radio☆24Aug 8, 2011Updated 14 years ago
- Very very useful example of loading and relocating the (Win32) DLL from memory (!) which allows many possibilities and much more flexibil…☆20Jan 2, 2013Updated 13 years ago
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Simple standalone bundle of NT core APIs☆25Mar 7, 2016Updated 9 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- The Software-Enabled IXP (SDX) platform☆40Mar 31, 2015Updated 10 years ago
- cuz life is scriptable...☆26May 6, 2016Updated 9 years ago
- A hobby os kernel on i386 arch.☆29Dec 14, 2012Updated 13 years ago
- Decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, can also remove IEEE 802.1Q (virtual lan) header. Works w…☆34Oct 14, 2018Updated 7 years ago
- ☆27May 5, 2016Updated 9 years ago