hardwaterhacker / i_want_my_eipView external linksLinks
Resources for I Want My EIP, presented at Derbycon 2017
☆11Sep 23, 2017Updated 8 years ago
Alternatives and similar repositories for i_want_my_eip
Users that are interested in i_want_my_eip are comparing it to the libraries listed below
Sorting:
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 3 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Jan 6, 2022Updated 4 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 10 months ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- ☆41Jan 10, 2020Updated 6 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- A list of windows potatoes!☆26Mar 6, 2022Updated 3 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- ☆25Dec 8, 2020Updated 5 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Sep 11, 2021Updated 4 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆107Jan 3, 2021Updated 5 years ago
- How long will it take to crack a hash ?☆31Mar 25, 2020Updated 5 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Collection of BOFs for Cobalt Strike☆33Mar 28, 2023Updated 2 years ago
- PowerShell Reverse HTTPs Shell☆30Nov 14, 2014Updated 11 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Jul 17, 2024Updated last year
- ☆39Apr 23, 2024Updated last year
- Ransomware Simulator for testing Blue Team Detections☆39Jun 5, 2022Updated 3 years ago
- Scripts and things.☆13Jan 23, 2026Updated 3 weeks ago
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- Security Assessment Report geNerated Automatically☆41Sep 26, 2024Updated last year
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- RunAsAttached is a program to run a console as another user and keep new console attached to caller console. Support reverse shell mode (…☆75Dec 25, 2022Updated 3 years ago