nigamaviral / Malicious-Browser-ExtensionView external linksLinks
System Security Project
☆13Feb 28, 2017Updated 8 years ago
Alternatives and similar repositories for Malicious-Browser-Extension
Users that are interested in Malicious-Browser-Extension are comparing it to the libraries listed below
Sorting:
- ☆17Jul 26, 2018Updated 7 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- Proof of calc for CVE-2019-6453☆50Jan 1, 2024Updated 2 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- a fast c-style struct packer & unpacker for golang☆36Jun 16, 2022Updated 3 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆97Sep 4, 2024Updated last year
- server2012-Group-policy-RCE☆46Oct 29, 2019Updated 6 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- ADK apps for Product Engineers☆28Jan 8, 2026Updated last month
- Looking for React.js jobs? Here are the most popular React Interview Questions and Answers which are most likely to be asked by the inter…☆10Jul 18, 2020Updated 5 years ago
- Poshito is a Windows C2 over Telegram☆18Oct 30, 2024Updated last year
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Notes some analysis related to VidarStealer sample☆17May 5, 2024Updated last year
- An extra light, extra simple Objective-C hooking framework☆16Jun 18, 2025Updated 7 months ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- WhatsApp statistics toolkit mirror☆10Mar 24, 2019Updated 6 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- C++14 automated code test infrastructure with permutation, fuzzing, sanitising and edge coverage☆12Dec 16, 2025Updated 2 months ago
- ☆12Mar 15, 2020Updated 5 years ago
- Angular Personal Resume And Portfolio Template☆10Jan 29, 2026Updated 2 weeks ago
- Just a modern packer for elf binaries ( works on linux executables only )☆41Mar 19, 2021Updated 4 years ago
- Simple ways to 0wn simple IOT devices☆65Mar 27, 2015Updated 10 years ago
- Simple Kernel Extension to read and write Kernel Memory☆14Aug 18, 2022Updated 3 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- ☆10Aug 18, 2025Updated 5 months ago
- Add-ons, projects, active systems, etc. for x/84☆12Dec 12, 2017Updated 8 years ago