☆101Nov 10, 2021Updated 4 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- ☆22Jul 7, 2017Updated 8 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Apr 13, 2018Updated 7 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- CVE-2018-8440 standalone exploit☆80Oct 31, 2018Updated 7 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- Plugin for x64dbg to break on unresolved APIs.☆13Oct 4, 2017Updated 8 years ago
- 一个微型的操作系统☆12Nov 10, 2021Updated 4 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Jan 11, 2017Updated 9 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆46Aug 13, 2017Updated 8 years ago
- ☆15Dec 26, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆294Sep 30, 2023Updated 2 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- A dns server that use to hijack other dns request in a wifi network for redirect to your custem http server ..☆20Jun 25, 2015Updated 10 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Proof of Concept's provided by Source Incite☆37Aug 10, 2017Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Educational tools for Binary Ninja☆20Jul 18, 2018Updated 7 years ago
- Fork of mona.py with x64dbg support☆109May 14, 2022Updated 3 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Use Windows Management Instrumentation interfaces to perform actions on a Windows system from a Linux System☆16Mar 15, 2012Updated 13 years ago
- A future hobby OS kernel☆11Nov 8, 2020Updated 5 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- spy windows ce API calls☆11Jun 3, 2014Updated 11 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- The pyspresso package is a Python-based framework for debugging Java.☆50Jun 17, 2016Updated 9 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 10 years ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆285May 14, 2020Updated 5 years ago
- ☆10Dec 5, 2023Updated 2 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆39Mar 30, 2017Updated 8 years ago