gentilkiwi / curveballLinks
CVE-2020-0601 #curveball - Alternative Key Calculator
☆78Updated 5 years ago
Alternatives and similar repositories for curveball
Users that are interested in curveball are comparing it to the libraries listed below
Sorting:
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 5 years ago
- ☆22Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Updated 4 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- WinLogon I/O (LogonUI) Plugin for PowerRemoteDesktop☆28Updated 3 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Updated 5 years ago
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆14Updated 3 years ago
- Conquer the deep ocean, host an .onion site fast!☆16Updated 3 years ago
- Remote Administration Tool For Windows VB.NET☆11Updated 6 years ago
- Automatically exported from code.google.com/p/hookme☆14Updated 10 years ago
- TaskMgr Volatile Environment LPE☆16Updated 5 months ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Updated 7 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆41Updated 2 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22Updated 3 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated 5 months ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 5 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Public exploits☆16Updated 7 years ago
- Trying to find unpublished leaks on solarleaks.net☆14Updated 4 years ago
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆22Updated 9 months ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆14Updated 2 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- PowerShell script that decrypts password entries from a Passwordstate server.☆26Updated 2 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Simple class to search and upload files☆28Updated 6 years ago