☆19May 30, 2022Updated 3 years ago
Alternatives and similar repositories for msdt_pwn
Users that are interested in msdt_pwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 10 months ago
- github军火库☆21May 24, 2017Updated 8 years ago
- PKCS#11 Private Key Extractor☆11May 7, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Truncate strings in a human-friendly way.☆14Dec 5, 2021Updated 4 years ago
- 通过Linux netlink NETLINK_CONNECTOR 协议实时进行监控本机进程情况。☆13Oct 11, 2019Updated 6 years ago
- idax: IDASDK extension libraries☆23Oct 12, 2025Updated 6 months ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- ☆38Jan 24, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This repo contains the installation guide and EFI files required to get a perfectly functional macOS hackintosh on your Lenovo Thinkbook …☆14Jun 2, 2025Updated 10 months ago
- An LLVM clone modified for use in RetDec and associated tools.☆19Feb 3, 2025Updated last year
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 4 months ago
- A simple example on how to initiate a direct syscall on WoW64☆12Feb 2, 2018Updated 8 years ago
- ☆12Aug 10, 2022Updated 3 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- ☆14Dec 4, 2021Updated 4 years ago
- ☆13Dec 24, 2025Updated 3 months ago
- Golang script to bypass the client-side health checks when logging into DUO protected accounts☆11Aug 26, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A list of resources to build a information security team.☆15Feb 10, 2021Updated 5 years ago
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- The argent tools beneath our sickening operation☆15Apr 16, 2020Updated 6 years ago
- Tools for work with the US Dept. of Transport on-time data and MonetDB☆13Mar 14, 2021Updated 5 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- Git Fastimport parser and generator in Python☆26Mar 2, 2026Updated last month
- SSL certificate parsing for humans☆36Jun 30, 2024Updated last year
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Iterate over Windows Handles☆16Nov 18, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Original PoC for CVE-2023-30367☆17Jan 4, 2024Updated 2 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- MailDir processor package for https://github.com/flashmob/go-guerrilla☆22Mar 18, 2017Updated 9 years ago
- Tools for signing Windows files☆15Apr 9, 2026Updated last week
- All TMF files that I extracted from Microsoft PDBs.☆14Jun 29, 2019Updated 6 years ago
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- merge android and recovery ramdisk into single boot.img file. and put Linux boot.img into recovery to dualboot android without reflashing…☆19Aug 8, 2024Updated last year