hexx0r / CVE-2015-6132
Microsoft Office / COM Object DLL Planting
☆15Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2015-6132
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 11 years ago
- Shellcode tracer☆15Updated 8 years ago
- simple rootkit for computer security class☆13Updated 11 years ago
- CVE-2015-3073 PoC☆11Updated 9 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- LD_PRELOAD rootkit☆21Updated 10 years ago
- Format string exploit generation☆9Updated 9 years ago
- Fuzzing Framework☆10Updated 7 years ago
- Exploit kit analyzer☆21Updated 9 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 8 years ago
- SNMP Backdoor Communication Channel☆15Updated 12 years ago
- ☆13Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 9 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Application Security library☆11Updated 12 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 7 years ago
- ☆10Updated 2 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago