ghoshzsh / os-notes-2022View external linksLinks
Operating System Notes created on 2022
☆19Jul 15, 2022Updated 3 years ago
Alternatives and similar repositories for os-notes-2022
Users that are interested in os-notes-2022 are comparing it to the libraries listed below
Sorting:
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆16Oct 20, 2024Updated last year
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 10 months ago
- ☆14Feb 7, 2023Updated 3 years ago
- Activation of Office 2019☆12Oct 13, 2019Updated 6 years ago
- An extension of the sigma standard to include security metrics.☆15May 18, 2023Updated 2 years ago
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆16Aug 24, 2023Updated 2 years ago
- ☆15Feb 28, 2020Updated 5 years ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- ☆13Sep 25, 2022Updated 3 years ago
- ☆22Jan 29, 2025Updated last year
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆22Jun 13, 2023Updated 2 years ago
- Coursera Course Symmetric Cryptography 🔑 part of Introduction to Applied Cryptography Specialization.☆17Sep 14, 2020Updated 5 years ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated 11 months ago
- Sherlock Discord bot☆19Aug 19, 2024Updated last year
- ☆22Jan 29, 2020Updated 6 years ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.☆20Jul 7, 2024Updated last year
- 这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)☆17Dec 10, 2024Updated last year
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- PoC for CVE-2023-20126☆23Jun 20, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago
- wsnet☆26Sep 24, 2025Updated 4 months ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- ALL Subject of Notes that are asked in GATE☆25Aug 11, 2019Updated 6 years ago
- Various PowerShell scripts that may be useful during red team exercise☆21Apr 28, 2022Updated 3 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆39Sep 23, 2023Updated 2 years ago
- An EVM Jump-Oriented Programming Puzzle in SECCON CTF 2023 Quals☆28Sep 18, 2023Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 2 years ago
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆27Jul 21, 2023Updated 2 years ago
- This Chromium extensions aims at supporting the analysis of single sign-on implementations, by offering semi-automated analysis and attac…☆29Jul 4, 2023Updated 2 years ago
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆28Aug 20, 2024Updated last year
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 2 years ago