My metasploit modules
☆24Jan 8, 2016Updated 10 years ago
Alternatives and similar repositories for metasploit_modules
Users that are interested in metasploit_modules are comparing it to the libraries listed below
Sorting:
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Various scripts helpful in sorting collections of malware samples.☆38Aug 19, 2016Updated 9 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 5 months ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57May 25, 2025Updated 9 months ago
- My small projects writen in 16 bit asm (NOTE: those are my practice projects that I wrote when I was 15, I give no warranty for this code…☆23Oct 14, 2021Updated 4 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Eternalblue-Doublepulsar-Metasploit☆21May 11, 2017Updated 8 years ago
- Firmware Reversing Repo :p☆17Oct 11, 2015Updated 10 years ago
- My Shellcode Archive☆29Mar 21, 2017Updated 9 years ago
- A set of small utilities, helpers for PIN tracers☆37Feb 15, 2026Updated last month
- ☆25Jan 18, 2015Updated 11 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A tool for calculating necessary SQL Server permissions☆23Feb 9, 2015Updated 11 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- A ready-made template for a project based on libpeconv.☆52Oct 31, 2025Updated 4 months ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- ☆18Jun 25, 2024Updated last year
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Small utility to generate complicated passwords - version with GUI☆19Nov 19, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆187Apr 22, 2025Updated 10 months ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Persistent IAT hooking application - based on bearparser☆265Sep 18, 2022Updated 3 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago