riesha / drv-vuln-scannerView external linksLinks
Finds imports that could be exploited, still requires manual analysis.
☆29Nov 9, 2022Updated 3 years ago
Alternatives and similar repositories for drv-vuln-scanner
Users that are interested in drv-vuln-scanner are comparing it to the libraries listed below
Sorting:
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- x64 Registration-Free In-Process COM Automation Server.☆51Nov 28, 2022Updated 3 years ago
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- ☆78Oct 18, 2022Updated 3 years ago
- ☆42Feb 18, 2025Updated 11 months ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- ☆31Jul 26, 2024Updated last year
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Keep it secret, keep it safe☆80Feb 6, 2025Updated last year
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated last year
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- A lexer and parser for Sleep☆20May 14, 2025Updated 9 months ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆130Jan 14, 2023Updated 3 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- ☆60Jan 9, 2023Updated 3 years ago
- Vectored Exception Handling Squared☆29Dec 27, 2025Updated last month
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- ☆26May 6, 2024Updated last year
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- ☆107Jan 4, 2023Updated 3 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Nov 19, 2022Updated 3 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- A swiss army knife tool for running, injecting and organizing your BOFs collection☆73Updated this week
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Feb 6, 2026Updated last week
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- ☆68Dec 9, 2022Updated 3 years ago
- ☆25Apr 28, 2024Updated last year
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Feb 8, 2026Updated last week
- Get Fine Grained Password Policy☆77Apr 15, 2025Updated 10 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆107Apr 18, 2024Updated last year
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- Load any Beacon Object File using Powershell!☆260Dec 9, 2021Updated 4 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- IDA (sort of) headless☆27Feb 17, 2024Updated last year