securifybv / u3-armory
U3 armory - exploiting the AutoRunz
☆22Updated 8 years ago
Alternatives and similar repositories for u3-armory:
Users that are interested in u3-armory are comparing it to the libraries listed below
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- ☆15Updated 8 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Updated 10 years ago
- See here:☆42Updated 12 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 2 months ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 9 years ago
- Scanner for the SkeletonKey Malware☆30Updated 10 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆62Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- ☆21Updated 10 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago