rehh86 / AfterDark
☆11Updated this week
Related projects: ⓘ
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 7 years ago
- ☆34Updated this week
- This script is used for extracting DDE in docx and xlsx☆12Updated 6 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 5 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆34Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- ☆33Updated this week
- ☆22Updated 7 years ago
- ☆21Updated 5 years ago
- ☆20Updated this week
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆34Updated 7 years ago
- ☆26Updated this week
- ☆26Updated this week
- Mimikatz HashClash☆12Updated 9 years ago
- Break Apps with Frida workshop material☆43Updated 6 years ago
- UAC 0Day all day!☆58Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆36Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- ☆29Updated this week
- ☆26Updated this week
- Exploit Reliability Testing System☆34Updated 9 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 7 years ago