securifybv / u3-armoryLinks
U3 armory - exploiting the AutoRunz
☆22Updated 8 years ago
Alternatives and similar repositories for u3-armory
Users that are interested in u3-armory are comparing it to the libraries listed below
Sorting:
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Updated 6 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 9 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- Rogue AP killer☆92Updated 8 years ago
- All related files and slides for past talks☆44Updated last month
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 9 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 5 years ago
- Get email notification when Virus Total has a copy of your binary.☆168Updated 5 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Breaking the security of Microsoft's RMS☆56Updated 6 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Updated 12 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Updated 9 years ago
- Some scripts for attacks on Tacacs+ protocol☆66Updated 6 years ago
- X41 Smartcard Fuzzer☆120Updated 7 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- HP printer security research code☆91Updated 8 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆87Updated 7 years ago
- ☆74Updated 3 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- ☆16Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆139Updated 8 years ago
- Material from our CANAPE workshop☆32Updated 7 years ago
- ☆65Updated 9 years ago