n1nj4sec / pymemimporterView external linksLinks
import pyd or execute PE all from memory using only pure python code and some shellcode tricks
☆74Mar 16, 2017Updated 8 years ago
Alternatives and similar repositories for pymemimporter
Users that are interested in pymemimporter are comparing it to the libraries listed below
Sorting:
- port of mimipenguin.sh in python with some additional protection features☆216Apr 30, 2017Updated 8 years ago
- A Bayesian Method for the Induction of Probalistic Networks from Data☆19Jul 6, 2017Updated 8 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- public exploits☆35May 11, 2023Updated 2 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Demos for Presentation on Windows Runtime Security☆70Nov 16, 2018Updated 7 years ago
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆350Dec 8, 2022Updated 3 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54May 15, 2021Updated 4 years ago
- ☆25May 13, 2019Updated 6 years ago
- Python library using ctypes to search/edit windows / linux / macOS / SunOS programs memory☆780Oct 7, 2022Updated 3 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 11 years ago
- ☆68Nov 15, 2022Updated 3 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- μετάμάσκα - malevolent payload classifier☆23Jun 29, 2023Updated 2 years ago
- Memory searching utilities☆43Nov 11, 2013Updated 12 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- Making me more antisocial and weird.☆10Oct 6, 2020Updated 5 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆27Nov 10, 2025Updated 3 months ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Avoidz tool to bypass most A.V softwares☆139Sep 28, 2017Updated 8 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 10 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago