scateu / U2FishingLinks
☆12Updated 7 years ago
Alternatives and similar repositories for U2Fishing
Users that are interested in U2Fishing are comparing it to the libraries listed below
Sorting:
- ☆13Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 7 years ago
- crash poc & Leak info PoC☆18Updated 7 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 10 years ago
- CVE-2019-12949☆26Updated 6 years ago
- Application Security library☆11Updated 13 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Updated 8 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Updated 6 years ago
- All the content from my Troopers 19 talk☆12Updated 6 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Updated 2 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 5 years ago
- 虚拟机逃逸exp工具 VMware Escape Exploit before VMware WorkStation 12.5.5☆10Updated 8 years ago
- Get a list of installed software in a safe manner☆11Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆18Updated 12 years ago
- x86_64 linux rootkit using debug registers☆53Updated 4 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- Code injection via delay load libraries☆36Updated 8 years ago
- ☆16Updated 6 years ago
- Zerokit shared code☆17Updated 6 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated last year
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- CVE-2018-4330 POC for iOS☆17Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Updated 8 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Updated 9 years ago
- 来自Freebuf评论区,一个UEFI马.☆50Updated 8 years ago