Volatility 3 plugins to extract a module as complete as possible
☆12Jun 13, 2023Updated 2 years ago
Alternatives and similar repositories for modex
Users that are interested in modex are comparing it to the libraries listed below
Sorting:
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Nov 2, 2025Updated 3 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- ☆35Dec 21, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆38Oct 5, 2023Updated 2 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆54Oct 19, 2023Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆13Nov 30, 2023Updated 2 years ago
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 9 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆12May 28, 2022Updated 3 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- Get the unique machine id of any host (without admin privileges)☆21Jul 15, 2025Updated 7 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool☆42Dec 5, 2025Updated 2 months ago
- ☆18Jan 21, 2026Updated last month
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Nov 22, 2024Updated last year
- CVE-2023-20198 Checkscript☆20Oct 23, 2023Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Feb 3, 2024Updated 2 years ago
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆25Jan 23, 2024Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- ☆16Jul 30, 2024Updated last year
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- huntr.dev public disclosures/hacktivity watcher☆16Nov 5, 2023Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Feb 14, 2022Updated 4 years ago
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆18Oct 16, 2023Updated 2 years ago
- Network Policy Helper☆30Feb 9, 2026Updated 2 weeks ago