☆71May 6, 2018Updated 7 years ago
Alternatives and similar repositories for winexe
Users that are interested in winexe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Fast, simple and lightweight micro bot-framework for Python.☆10Oct 22, 2017Updated 8 years ago
- Organise and access data collected during internal network pentests☆10Jun 4, 2020Updated 5 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆10Oct 22, 2017Updated 8 years ago
- dns logger for passive dns collection☆42May 27, 2012Updated 13 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Hansel - a simple but flexible search for IDA☆26Jul 11, 2019Updated 6 years ago
- laboratório sobre buffer overflows☆15Apr 17, 2017Updated 9 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆43Mar 1, 2025Updated last year
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The plan is to have a replacement for psexec☆32Aug 15, 2018Updated 7 years ago
- Use LD_PRELOAD to redirect socket ports or unix domain socket paths☆13Sep 29, 2020Updated 5 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Dec 16, 2023Updated 2 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- cheap and terrible voltage glitcher hardware/software☆43Jan 1, 2020Updated 6 years ago
- SnappingTurtle: A cross platform web exploitation tool.☆18Apr 11, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Yet another rule generator for Yara☆29Jun 6, 2025Updated 10 months ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- SSL certificate cloner☆14Jan 25, 2018Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Oct 8, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 6 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- OS Post-installation Scripts☆13Sep 29, 2016Updated 9 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 10 months ago