silentsignal / oracle_formsLinks
Testing tools for Oracle Forms
☆12Updated last month
Alternatives and similar repositories for oracle_forms
Users that are interested in oracle_forms are comparing it to the libraries listed below
Sorting:
- Oracle Forms Standalone Runner; run oracle forms 11 wep-applets standalone without browser (for example on Linux)☆13Updated 2 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Testing tools for Oracle Forms☆45Updated 2 years ago
- Fork of ReactOS (Cmd.exe), IRTriage Command Line Interpreter☆19Updated 7 years ago
- Inject code into .net applications☆12Updated 7 years ago
- Custom pentesting tools☆26Updated 5 years ago
- Clone of the original project https://sourceforge.net/projects/sqsh/☆13Updated 2 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- PowerShell Module for parsing logs generated by Sysinternals Sysmon for Linux☆37Updated 3 years ago
- Open source tool for static analysis of malwares.☆28Updated 5 years ago
- ☆16Updated last year
- A solution to create obfuscated download cradles for PowerShell.☆16Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆47Updated 5 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆44Updated 5 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆78Updated 5 years ago
- Windows productivity tweaks☆15Updated 5 years ago
- Execute .Net assemblies using Rundll32.exe☆113Updated 4 years ago
- ☆13Updated 3 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- DPAPI offline decryption utility☆72Updated 2 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆21Updated 7 years ago
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def …☆98Updated 10 months ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 4 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Updated last year
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- Map remote .NET assemblies to memory for further invocation.☆40Updated 4 years ago
- A simple XLL, showing how to create an XLL from scratch.☆49Updated 9 years ago