ActiveMime File Format Documentation
☆19Jun 28, 2021Updated 4 years ago
Alternatives and similar repositories for activemime-format
Users that are interested in activemime-format are comparing it to the libraries listed below
Sorting:
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- Compressed Rich Text Format (RTF) compression and decompression in Python☆24Jun 29, 2025Updated 8 months ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Aug 25, 2017Updated 8 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Monitor the textual data pasted into Windows clipboard☆29Nov 4, 2018Updated 7 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- An isolated environment for DNS cache poisoning attack investigation and demonstration.☆10Nov 22, 2020Updated 5 years ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 3 months ago
- ExtendedMacro - BurpSuite plugin providing extended macro functionality☆15Jan 13, 2021Updated 5 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- ☆12May 6, 2020Updated 5 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- A Maltego transform for VirusTotal Submitter Information☆36May 15, 2019Updated 6 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- ☆43Nov 5, 2018Updated 7 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- ☆15Nov 29, 2017Updated 8 years ago
- ☆12Feb 1, 2022Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Run strongr-frida-server on boot with Magisk☆14Oct 12, 2024Updated last year
- Useful windows tools for Blue, Red & Purple teams☆11Mar 8, 2026Updated 2 weeks ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Apr 15, 2019Updated 6 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- Digital Forensics date and time☆23Dec 22, 2025Updated 3 months ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆18Jul 2, 2022Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Files used for various testing methodologies.☆12Updated this week
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 9 years ago