Fuzzbunch Python-Wine wrapper
☆56Apr 23, 2017Updated 8 years ago
Alternatives and similar repositories for fuzzbunch_wrapper
Users that are interested in fuzzbunch_wrapper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆239Dec 6, 2018Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- Fix acquired .evt - Windows Event Log files (Forensics)☆18Mar 29, 2016Updated 9 years ago
- VBS Reversed TCP Meterpreter Stager☆88May 25, 2017Updated 8 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 8 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,031Feb 3, 2020Updated 6 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- NSA finest tool☆988Apr 17, 2017Updated 8 years ago
- discuz-plugin-scan☆21Sep 23, 2015Updated 10 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Mar 6, 2019Updated 7 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 2 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- Scumblr instructions with custom search providers for monitoring malicous content☆17Nov 18, 2017Updated 8 years ago
- 一个xss利用平台☆18Jun 1, 2014Updated 11 years ago
- Source code and binaries of FlexiSpy from the Flexidie dump☆838Oct 23, 2019Updated 6 years ago
- Leveraging LLM to generate Java deserialization chains☆52Mar 12, 2026Updated last week
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- ☆11Apr 28, 2017Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,989Apr 14, 2017Updated 8 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Dec 9, 2021Updated 4 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Metasploit Framework☆26Feb 10, 2026Updated last month
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆271Jun 5, 2023Updated 2 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- subdomain、port、folder scanner☆25Apr 20, 2016Updated 9 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- A Open Source XSS test platform powered by web.py <img/src=1 onerror=alert/:P/☆38Feb 15, 2014Updated 12 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- Qubes OS architecture diagrams for use in articles, posts and docs☆19Oct 3, 2017Updated 8 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- A simple way for detection the remote user's antivirus☆84Oct 24, 2016Updated 9 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆313Sep 10, 2018Updated 7 years ago