giMini / PowerRSALinks
Generate RSA keys, encrypt and decrypt data
☆24Updated 4 years ago
Alternatives and similar repositories for PowerRSA
Users that are interested in PowerRSA are comparing it to the libraries listed below
Sorting:
- Post-explotation Hacks☆14Updated 7 years ago
- ☆21Updated 9 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 10 years ago
- Common Malware Techniques☆13Updated 2 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆27Updated 9 years ago
- Making shellcode UD - https://osandamalith.com☆25Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 10 years ago
- ☆22Updated 8 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- Anti-AV compilation☆44Updated 12 years ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark format☆13Updated 11 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Updated 13 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- ☆30Updated 8 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 10 years ago
- Remote execution tool☆14Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Updated 7 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Updated 9 years ago
- Malware monitor template based on MinHook☆17Updated 10 years ago
- ☆16Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Updated 8 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- A simple shellcode runner☆22Updated 11 years ago
- ☆65Updated 9 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆14Updated 9 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated last month