jgegeny / gootkit-xswkit-js
☆30Updated 8 years ago
Related projects: ⓘ
- ☆52Updated this week
- POC for IAT Parsing Payloads☆46Updated 7 years ago
- ☆15Updated this week
- ☆39Updated this week
- ☆33Updated this week
- Simple tool to automate adding shellcode to PE files☆50Updated 6 years ago
- ☆42Updated this week
- Python script to inject and run shellcodes through TLS callbacks☆50Updated 9 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆19Updated 9 years ago
- ☆38Updated this week
- ☆62Updated this week
- ☆14Updated this week
- ☆29Updated this week
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 7 years ago
- ☆54Updated this week
- ☆33Updated this week
- Slides from previous conference talks☆40Updated 7 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆21Updated 10 years ago
- ☆34Updated this week
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆55Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆69Updated 10 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 11 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 7 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆83Updated 7 years ago
- ☆16Updated this week
- CVE-2017-11882 File Generator PoC☆35Updated 6 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆49Updated 6 years ago
- ☆26Updated this week
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 4 years ago
- [Windows] Local Privilege Escalation - WebClient☆57Updated 7 years ago