A tool for manipulating SWF files, leveraging zlib to craft alphanumeric-only valid SWF files in order to allow CSRF with SOP bypass thanks to JSONP abuse.
☆107Mar 26, 2024Updated last year
Alternatives and similar repositories for rosettaflash
Users that are interested in rosettaflash are comparing it to the libraries listed below
Sorting:
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Bash script for checking HTTP headers for security☆17Jan 16, 2014Updated 12 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Aug 26, 2013Updated 12 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Apr 6, 2014Updated 11 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Zeus Gameover reverse engineering work☆16Feb 11, 2014Updated 12 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Revisiting Helpviewer.app to hack Parallels for Mac☆17Sep 14, 2019Updated 6 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆13Dec 17, 2018Updated 7 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- C# / .NET Library for Reading and Writing PassKit files☆24Oct 19, 2012Updated 13 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- A repository of scripts and files related to the CryptoWall version 3 threat☆12Mar 3, 2016Updated 10 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Sep 20, 2015Updated 10 years ago
- A dark theme for WinDBG.☆35Jul 9, 2014Updated 11 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- Virtual Security Module☆15Jul 1, 2021Updated 4 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Cross Domain XHR: A drop-in replacement for XmlHttpRequest object.☆61Jan 31, 2013Updated 13 years ago
- ☆44Dec 23, 2014Updated 11 years ago
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- Fizzer is an assessment tool for fuzzing FIX messages.☆29Aug 18, 2021Updated 4 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago