gentilkiwi / curveballLinks
CVE-2020-0601 #curveball - Alternative Key Calculator
☆78Updated 5 years ago
Alternatives and similar repositories for curveball
Users that are interested in curveball are comparing it to the libraries listed below
Sorting:
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 4 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆30Updated 3 years ago
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- WinLogon I/O (LogonUI) Plugin for PowerRemoteDesktop☆27Updated 3 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- ☆22Updated 2 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆15Updated 3 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 3 years ago
- Conquer the deep ocean, host an .onion site fast!☆16Updated 2 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Updated 4 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated last month
- LDAP library for auditing MS AD☆13Updated last year
- Trying to take the dum-dum out of security☆12Updated 8 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆97Updated 6 months ago
- TaskMgr Volatile Environment LPE☆14Updated 2 months ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated last year
- A collection of curated Java Deserialization Exploits☆11Updated 7 years ago
- Remote Access Tool Written In C#☆12Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 5 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆19Updated 5 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆21Updated 5 months ago