python scripts
☆15Dec 5, 2019Updated 6 years ago
Alternatives and similar repositories for python
Users that are interested in python are comparing it to the libraries listed below
Sorting:
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 5 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Implementation for in-memory patching ida.dll and ida64.dll☆15May 8, 2020Updated 5 years ago
- ☆34Nov 17, 2017Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- ☆30May 23, 2017Updated 8 years ago
- ASUSTeK AsIO3 I/O driver unlock☆23Apr 22, 2021Updated 4 years ago
- cve-2019-0708 poc .☆13May 24, 2019Updated 6 years ago
- ☆41Jul 9, 2020Updated 5 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 23, 2023Updated 2 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- CVE-2019-0604☆133Mar 22, 2019Updated 6 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Inject dll to process in driver☆10Aug 27, 2024Updated last year
- ☆17Oct 5, 2020Updated 5 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Apr 24, 2016Updated 9 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Jun 17, 2020Updated 5 years ago
- CVE-2019-0859 1day Exploit☆119Feb 11, 2020Updated 6 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Cowrie SSH/Telnet Honeypot☆12Sep 3, 2018Updated 7 years ago
- ☆21Jan 4, 2022Updated 4 years ago
- ☆28Jan 10, 2024Updated 2 years ago
- ☆10Dec 28, 2023Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Packet Injection With WFP☆16Feb 20, 2023Updated 3 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Java Object Deserialization on Android☆86Apr 11, 2019Updated 6 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- All Base libraries decryption tool☆14Jan 2, 2022Updated 4 years ago
- A tool to triage screenshots☆20Jun 29, 2017Updated 8 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆10Jun 18, 2020Updated 5 years ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago