mgeeky / RPISEC-MBE-SolutionsView external linksLinks
Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.
☆21Feb 5, 2017Updated 9 years ago
Alternatives and similar repositories for RPISEC-MBE-Solutions
Users that are interested in RPISEC-MBE-Solutions are comparing it to the libraries listed below
Sorting:
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Jul 6, 2021Updated 4 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- Self hosting ipgrabber☆11May 21, 2022Updated 3 years ago
- Collection of notes for talks☆13Jan 6, 2024Updated 2 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 3 weeks ago
- ☆16Jul 9, 2019Updated 6 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Utterly simple NTFS Journal dumping utility. Handy when it comes to Computer Forensics and Malware Forensics Ops.☆38Mar 21, 2016Updated 9 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detectio…☆19Jun 22, 2023Updated 2 years ago
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆41Jul 1, 2019Updated 6 years ago
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- ☆20Oct 7, 2013Updated 12 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 8 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- ☆16Jun 4, 2019Updated 6 years ago
- A Python script for extracting encoded text from PNG images☆17Oct 28, 2021Updated 4 years ago
- A VM for CTF binary exploitation challenges☆20Mar 11, 2020Updated 5 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 8 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆40Aug 8, 2022Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 3 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 5 years ago
- ☆39May 31, 2017Updated 8 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Oct 19, 2017Updated 8 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago