sourceincite / tools
☆96Updated 3 years ago
Alternatives and similar repositories for tools:
Users that are interested in tools are comparing it to the libraries listed below
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- CVE-2018-8440 standalone exploit☆79Updated 6 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 7 years ago
- Proof of Concept's provided by Source Incite☆37Updated 7 years ago
- The Outlook HTML Leak Test Project☆132Updated 6 years ago
- UAC 0Day all day!☆58Updated 7 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆135Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- public exploits☆35Updated last year
- ☆51Updated 8 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆151Updated 4 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- WhiteBox CMS analysis☆69Updated last year
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Radamsa fuzzer extension for Burp Suite☆23Updated 11 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 8 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 6 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆99Updated 5 years ago