Qubes containerization on Windows
☆129Apr 21, 2021Updated 4 years ago
Alternatives and similar repositories for Wubes
Users that are interested in Wubes are comparing it to the libraries listed below
Sorting:
- ☆108Oct 14, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- Linux Kernel module-less implant (backdoor)☆73Mar 11, 2021Updated 5 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- nanoMIPS IDA plugin☆68Sep 15, 2021Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Jul 30, 2020Updated 5 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆234Oct 18, 2022Updated 3 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- NVIDIA SocketCAN drivers for Bosch Time Triggered M_CAN and Tegra Hypervisor sec CAN☆12Dec 26, 2021Updated 4 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Oct 21, 2020Updated 5 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- AWS STS token decoder☆46Mar 18, 2025Updated last year
- IBM RedCON 2020 - Throwing an AquaWrench into the Kernel☆44Aug 25, 2020Updated 5 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- ☆11Dec 19, 2024Updated last year
- Standardized Malware Analysis Tool☆56Mar 9, 2021Updated 5 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆132Nov 10, 2023Updated 2 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- A "no frills" 1 class-only, C# .NET command line parser with support for - and / args, switches only, and Name : Values☆34Jan 20, 2026Updated 2 months ago
- Fermion, an electron wrapper for Frida & Monaco.☆701Mar 20, 2025Updated last year
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Aug 16, 2022Updated 3 years ago
- Joern Workshops☆32Jan 16, 2025Updated last year
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Aug 5, 2022Updated 3 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustr…☆17Aug 18, 2021Updated 4 years ago
- Spray a hash via smb to check for local administrator access☆142Feb 7, 2021Updated 5 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- A tool that implements the Golden SAML attack☆341Oct 15, 2018Updated 7 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆622Aug 15, 2025Updated 7 months ago
- ☆78Oct 18, 2022Updated 3 years ago