System Security Project
☆13Feb 28, 2017Updated 9 years ago
Alternatives and similar repositories for Malicious-Browser-Extension
Users that are interested in Malicious-Browser-Extension are comparing it to the libraries listed below
Sorting:
- ☆17Jul 26, 2018Updated 7 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- Proof of calc for CVE-2019-6453☆50Jan 1, 2024Updated 2 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- medium-rare☆28Nov 21, 2019Updated 6 years ago
- Clickjacking PoC Generator☆35Oct 1, 2020Updated 5 years ago
- a fast c-style struct packer & unpacker for golang☆36Jun 16, 2022Updated 3 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- ☆42Dec 1, 2023Updated 2 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆97Sep 4, 2024Updated last year
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆112Sep 8, 2024Updated last year
- ☆13Oct 10, 2018Updated 7 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- A python script that converts input character strings to QR Code using emojis. The output can be copied & pasted where desired.☆12Jun 25, 2019Updated 6 years ago
- ADK apps for Product Engineers☆29Jan 8, 2026Updated 2 months ago
- A small tool to patch PE files' import address table with an external payload DLL.☆16Feb 15, 2026Updated 3 weeks ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- Angular Personal Resume And Portfolio Template☆11Updated this week
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- ☆12Aug 16, 2022Updated 3 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- C++14 automated code test infrastructure with permutation, fuzzing, sanitising and edge coverage☆12Dec 16, 2025Updated 2 months ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- WhatsApp statistics toolkit mirror☆10Mar 24, 2019Updated 6 years ago
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated last year
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- A rust implementation of Andrej Karpathy's Micrograd☆10Apr 28, 2025Updated 10 months ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Just a modern packer for elf binaries ( works on linux executables only )☆41Mar 19, 2021Updated 4 years ago