mr-r3b00t / msdt_pwnView external linksLinks
☆19May 30, 2022Updated 3 years ago
Alternatives and similar repositories for msdt_pwn
Users that are interested in msdt_pwn are comparing it to the libraries listed below
Sorting:
- Rizin Signature Database (Source)☆15Aug 23, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- ☆28Feb 3, 2022Updated 4 years ago
- ☆39Jan 24, 2024Updated 2 years ago
- DEFCON30 Talk Material, References and Extra Bits☆39Oct 30, 2022Updated 3 years ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing grea…☆13Aug 31, 2023Updated 2 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- ☆22Nov 22, 2025Updated 2 months ago
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆49Mar 19, 2022Updated 3 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Use kprobe capture common kernel event and can also use for hids agent(kernel module)☆10Nov 28, 2023Updated 2 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- Example of an ELF parser to learn about the ELF format☆10Oct 6, 2024Updated last year
- Automated, aggressive reconnaissance engine for Bug Bounty Hunting and Red Teaming. Features hardware auto-scaling, smart recursion, and …☆17Dec 18, 2025Updated last month
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Premake's static website, with landing and download pages.☆10Jan 24, 2026Updated 3 weeks ago
- A toolkit to unpack, debug and repack an rpk file.☆12Jan 27, 2021Updated 5 years ago
- ☆11Apr 16, 2025Updated 10 months ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- ☆14Dec 4, 2021Updated 4 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆12Mar 20, 2024Updated last year
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago