securifybv / u3-armoryLinks
U3 armory - exploiting the AutoRunz
☆22Updated 8 years ago
Alternatives and similar repositories for u3-armory
Users that are interested in u3-armory are comparing it to the libraries listed below
Sorting:
- s(4)u for Windows☆48Updated 4 years ago
- CANAPE Network Testing Tool☆34Updated 6 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆123Updated 11 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆86Updated 4 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Updated 6 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- Get email notification when Virus Total has a copy of your binary.☆166Updated 5 years ago
- Rogue AP killer☆90Updated 7 years ago
- Breaking the security of Microsoft's RMS☆55Updated 6 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 7 years ago
- Big Iron Recon & Pwnage☆127Updated 3 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- ☆74Updated 3 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Updated 10 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆36Updated 8 years ago
- Tool to make in memory man in the middle☆125Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Mainframe bruter and screen automation utility.☆43Updated 10 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Updated 9 years ago