marasawr / fml
I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!
☆21Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for fml
- Material from our CANAPE workshop☆32Updated 5 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- Simple DDE object detector☆55Updated 6 years ago
- POLAR☆73Updated 5 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆34Updated 6 years ago
- ☆25Updated this week
- This script is used for extracting DDE in docx and xlsx☆12Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 6 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 5 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆25Updated 7 years ago
- A vulnerability reporting database to help pentesters write consistent, easy reports.☆9Updated 8 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Updated 7 years ago
- put this here because archival reasons.☆28Updated 6 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- ☆17Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆82Updated 4 years ago
- Materials for 44con 2014 CANAPE Workshop☆22Updated 10 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆20Updated 9 years ago
- Burp Suite extension to perform Kerberos authentication☆12Updated 7 years ago