securifybv / u3-armoryLinks
U3 armory - exploiting the AutoRunz
☆22Updated 8 years ago
Alternatives and similar repositories for u3-armory
Users that are interested in u3-armory are comparing it to the libraries listed below
Sorting:
- A proof of concept demonstrating the use of Google Drive for command and control.☆87Updated 7 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 5 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Some scripts for attacks on Tacacs+ protocol☆65Updated 6 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆129Updated 12 years ago
- A shellcode testing harness.☆70Updated last year
- Rogue AP killer☆92Updated 7 years ago
- Social Engineering Abusing Google App Scripts☆24Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 9 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 8 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- CANAPE Network Testing Tool☆34Updated 7 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Updated 11 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago