robertdavidgraham / smb-loggerLinks
Logs incoming attempts to connect to NetBIOS/SMB
☆14Updated 8 years ago
Alternatives and similar repositories for smb-logger
Users that are interested in smb-logger are comparing it to the libraries listed below
Sorting:
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- Zerokit shared code☆16Updated 6 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Apache use after free bug infos / ASAN stack traces☆66Updated 6 years ago
- ☆20Updated 5 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 4 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆13Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- KernelBugTest☆15Updated 7 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Updated 9 years ago
- ☆10Updated 5 months ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- ☆23Updated 9 years ago
- ☆28Updated 8 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Sample showing the use of CoGetInterceptor☆21Updated 4 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- Fuzzing Framework☆10Updated 7 years ago
- NoREpls - Application designed for the purposes of reverse engineering.☆11Updated 6 years ago