Various exploits, metasploit modules, etc.
☆15Jun 3, 2016Updated 9 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- ☆18Feb 4, 2014Updated 12 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Golang Dev Env Dockerfile☆17Mar 29, 2019Updated 6 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- Elasticsearch / Kibana for Unifi USG and CloudKey (gen2)☆19Jun 5, 2020Updated 5 years ago
- ☆108Jul 18, 2017Updated 8 years ago
- Twitter bots, IRC bots, bots that make other bots. The world of bots is limitless.☆19Sep 24, 2016Updated 9 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Sep 13, 2015Updated 10 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Feb 8, 2019Updated 7 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Python tools for interacting with a DarkComet Client☆54Aug 4, 2015Updated 10 years ago
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- Python 3 Google Safe Browsing library☆28Mar 27, 2025Updated 11 months ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Jun 23, 2016Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- Python SDK for vishwa.ai☆21Jan 29, 2024Updated 2 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆75Aug 30, 2016Updated 9 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- ☆36Jul 24, 2016Updated 9 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Modified edition of cuckoo community modules☆32Sep 9, 2019Updated 6 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago