kbandla / tools
random python stuff
☆25Updated 9 years ago
Alternatives and similar repositories for tools:
Users that are interested in tools are comparing it to the libraries listed below
- Win32 Shellcodes☆9Updated 7 years ago
- ☆10Updated 2 months ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- Juniper backdoor☆13Updated 9 years ago
- Some source code snippets In my development.☆27Updated 3 years ago
- ☆20Updated last year
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- Mixing up CVE and MS like a pro☆24Updated 8 years ago
- Remote detection of a user's AV using Flash☆13Updated 8 years ago
- ☆19Updated 11 years ago
- Shellcode tracer☆15Updated 8 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 8 years ago
- library to decode/parse zeus-like configuration files☆29Updated 7 years ago
- A framework for creating modular bots/backdoors☆21Updated 9 years ago
- Malware.lu configuration extractor☆24Updated 11 years ago
- Malpimp is an advanced API tracing tool and designed to automate the reverse engineering process. In the backend it uses pydbg to hook t…☆8Updated 8 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- ☆22Updated 7 years ago
- An implementation of a generic unpacker based on Intel PIN☆29Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆21Updated 12 years ago
- ☆9Updated 9 years ago
- Scanner for the SkeletonKey Malware☆30Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago