Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003
☆21Jan 19, 2015Updated 11 years ago
Alternatives and similar repositories for WindowsFirewallHookDriverEnumeration
Users that are interested in WindowsFirewallHookDriverEnumeration are comparing it to the libraries listed below
Sorting:
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Volatility plugins☆12Feb 19, 2015Updated 11 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 8 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- https://gallery.technet.microsoft.com/PS2EXE-Convert-PowerShell-9e4e07f1☆14Apr 13, 2017Updated 8 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- ☆11May 19, 2017Updated 8 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- A gevent based socks5 tunnel server.☆17Jul 10, 2012Updated 13 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- Experimental Windows .text section Patch Detector☆22Jan 26, 2015Updated 11 years ago
- Windows Crypt API hook to generate weak keys☆47Nov 1, 2016Updated 9 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- wsnet☆26Feb 19, 2026Updated last week
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- A python script used to parse the SAM registry hive.☆76Jan 26, 2018Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Aug 20, 2020Updated 5 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Mar 19, 2014Updated 11 years ago
- Babel Scripting Framework☆43Oct 28, 2020Updated 5 years ago