NoSQL Injection Demo Application
☆13Oct 18, 2013Updated 12 years ago
Alternatives and similar repositories for NoSQLInjectionDemo
Users that are interested in NoSQLInjectionDemo are comparing it to the libraries listed below
Sorting:
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- A collection of anti disassembly techniques☆20Jul 22, 2017Updated 8 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- ☆17May 7, 2025Updated 10 months ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Study about HQL injection exploitation.☆51May 15, 2016Updated 9 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Multi Vagrant environment with Active Directory☆14Jun 29, 2018Updated 7 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Use kprobe capture common kernel event and can also use for hids agent(kernel module)☆10Nov 28, 2023Updated 2 years ago
- 获取浏览器保存密码,支持IE、Chrome和火狐☆12Oct 30, 2019Updated 6 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- PHDAYS |||☆17May 23, 2013Updated 12 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Reverse Windows shell over TLS☆19Mar 3, 2016Updated 10 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- OUTDATED☆11Mar 8, 2020Updated 6 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆13Aug 29, 2016Updated 9 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆14Oct 2, 2019Updated 6 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- Anything ( :-) ) you can do with a MS-Windows file (but faster)☆15Nov 23, 2023Updated 2 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- ☆30Sep 5, 2025Updated 6 months ago
- An Unreal Inventory and Item System☆14Nov 16, 2023Updated 2 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago