Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.
☆12Jun 2, 2020Updated 5 years ago
Alternatives and similar repositories for Twicexploit
Users that are interested in Twicexploit are comparing it to the libraries listed below
Sorting:
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- A cmake template for crystal palace☆39Dec 20, 2025Updated 2 months ago
- MDE/MDI Defender setup for Ludus☆38Updated this week
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- Changes MDM registry keys without the need for an MDM server to quickly disable WiFi-Sense and handle other potential security concerns i…☆15Aug 10, 2015Updated 10 years ago
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- ☆13Jul 24, 2022Updated 3 years ago
- ☆15Aug 23, 2020Updated 5 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- This is an OllyDbg plugin which will help you to import map files exported by IDA, Dede, IDR, Microsoft and Borland linkers.☆22Aug 12, 2015Updated 10 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Monitor JSON notifications feed from VT☆17Jun 13, 2017Updated 8 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- two types (external/internal) cheat examples, and game to test on.☆16Oct 27, 2022Updated 3 years ago
- A collection of anti disassembly techniques☆20Jul 22, 2017Updated 8 years ago
- C++ Script to Create "Obfuscated Native ShellCode Launcher" #Obfuscator #Shellcode #Generator☆13Apr 3, 2021Updated 4 years ago
- Source code for Modbus/TCP fuzzer used for ETFA 2015 paper☆21Feb 6, 2025Updated last year
- Library for linking multiple PE\PE + files to one☆52Mar 16, 2024Updated last year
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 5 years ago
- My conference presentations and publications☆26Feb 24, 2022Updated 4 years ago
- PoC for DEF CON 26: Playing Malware Injection with Exploit thoughts☆25Aug 17, 2018Updated 7 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- Slides and resources from MCTTP 2025 Talk☆66Oct 26, 2025Updated 4 months ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- Loads shellcode from a resource file.☆22Aug 15, 2019Updated 6 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago