h3ph4est7s / HelepolisView external linksLinks
Android based APT exploitation framework
☆36Jul 20, 2015Updated 10 years ago
Alternatives and similar repositories for Helepolis
Users that are interested in Helepolis are comparing it to the libraries listed below
Sorting:
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Feb 2, 2018Updated 8 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- The pyspresso package is a Python-based framework for debugging Java.☆50Jun 17, 2016Updated 9 years ago
- gdb plugin for android debugging☆103Jun 20, 2016Updated 9 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- RWMC is no longer supported. Please use PowerMemory.☆164Feb 13, 2016Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- This is an OS X Privilege escalation exploit. The Payload function of this exploit is sending a root shell. Change the IP and the destina…☆34Dec 16, 2016Updated 9 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- fuzz☆124Jul 18, 2015Updated 10 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175May 6, 2016Updated 9 years ago
- Summit Route End Point Protection - Server code☆11Apr 10, 2016Updated 9 years ago
- A Python extension for managing External Memory Data Structures (EMDs)☆51Aug 26, 2024Updated last year
- Android wireless karma attack detector☆67Aug 26, 2015Updated 10 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- A taster of TTWE☆18Sep 1, 2014Updated 11 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- My masters degree dissertation for ISG, Royal Holloway (2011) on evolutionary fuzzing☆11Jul 22, 2016Updated 9 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- An Online Analysis System for Packed Android Malware☆107Jul 28, 2016Updated 9 years ago