nccgroup / memgrepLinks
Memory searching utilities
☆43Updated 12 years ago
Alternatives and similar repositories for memgrep
Users that are interested in memgrep are comparing it to the libraries listed below
Sorting:
- A simple reflective dll example☆19Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Updated 9 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 7 years ago
- ☆24Updated 8 years ago
- ☆65Updated 9 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- ☆50Updated 8 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 8 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- ☆55Updated 8 years ago
- ☆19Updated 8 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Updated 10 months ago
- SilkETW & SilkService☆40Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- ☆58Updated 8 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Updated 11 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆48Updated 8 years ago
- Powershell Persistence Locator☆66Updated 9 years ago
- SysCon14 release☆55Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- ☆83Updated 9 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago