Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad character identifier, shellcode carver, and a vanilla EIP exploiter
☆24Nov 24, 2019Updated 6 years ago
Alternatives and similar repositories for WoollyMammoth
Users that are interested in WoollyMammoth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆25Sep 3, 2024Updated last year
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Nov 24, 2019Updated 6 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆10Jan 17, 2022Updated 4 years ago
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Remote Administration Tool☆13Jul 9, 2023Updated 2 years ago
- Quick and dirty PoSH code to read teams messages☆23Feb 5, 2025Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated last month
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 7 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- JavaScript Static Code Analysis☆25Jan 14, 2015Updated 11 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆26May 14, 2023Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- ☆12Oct 10, 2024Updated last year
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- ☆12Jan 10, 2025Updated last year
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- Bad Apple in Amiga Anim format, complete with a guide on how to make your own Sound Anims☆10Jul 2, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- ☆15May 17, 2018Updated 7 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Jun 27, 2019Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Journey to learning frida android.☆11Apr 23, 2019Updated 6 years ago