NCC Code Navigator
☆55May 9, 2016Updated 9 years ago
Alternatives and similar repositories for ncccodenavi
Users that are interested in ncccodenavi are comparing it to the libraries listed below
Sorting:
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Mar 11, 2016Updated 9 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- A small and dirty Python 2 decompiler written in Python.☆13Dec 29, 2013Updated 12 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- ☆101Nov 10, 2021Updated 4 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- A lean portable Erlang, no BEAM☆52Sep 26, 2013Updated 12 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Easy source control hooks in Python☆11Aug 3, 2015Updated 10 years ago
- Windows Share Enumerator☆129Nov 1, 2018Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Parse unencrypted .NET ViewState objects with JavaScript☆21Dec 3, 2021Updated 4 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆21Jan 19, 2015Updated 11 years ago
- Toolset for writing shellcode in Python's Pickle language and for manipulating pickles to inject shellcode.☆85Apr 20, 2017Updated 8 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- s(4)u for Windows☆48Dec 8, 2020Updated 5 years ago
- ☆19May 31, 2017Updated 8 years ago
- A mirror of "103_top_shell.rar" since the original disappeared.☆25Sep 27, 2015Updated 10 years ago
- Erlang GTK binding☆38Mar 17, 2023Updated 2 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆69Apr 7, 2018Updated 7 years ago
- NCC Group Ransomware Simulator☆69Jul 7, 2016Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆408Nov 17, 2014Updated 11 years ago
- A "not-evil" keylogger with Unicode support☆27Feb 2, 2013Updated 13 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago