☆17Oct 26, 2018Updated 7 years ago
Alternatives and similar repositories for Fuzz-FFmpeg
Users that are interested in Fuzz-FFmpeg are comparing it to the libraries listed below
Sorting:
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Jenkins X 3.x GitOps repository using Minikube to create a kubernetes cluster and vault for secret management☆13Feb 15, 2026Updated last week
- ☆11Mar 19, 2019Updated 6 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- C# web scraper which targets chaturbate.com☆12Sep 14, 2018Updated 7 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 7 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- ☆15May 23, 2019Updated 6 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- A command line tool and a library to generate TLS certificates for development purposes.☆36Jul 5, 2021Updated 4 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Jul 8, 2019Updated 6 years ago
- python scripts☆15Dec 5, 2019Updated 6 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- 大学毕业设计,远程控制工具集,包含远程命令行,远程文件管理,远程桌面,已停止维护。☆14Dec 27, 2015Updated 10 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated 3 weeks ago
- VNC_Proxy / Repeater☆20Oct 14, 2014Updated 11 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Apr 30, 2019Updated 6 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Mar 28, 2018Updated 7 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 8 years ago