PLASMA PULSAR
☆70May 19, 2017Updated 8 years ago
Alternatives and similar repositories for plasmapulsar
Users that are interested in plasmapulsar are comparing it to the libraries listed below
Sorting:
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- public exploits☆36May 11, 2023Updated 2 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Nov 14, 2019Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Support x86 and x64☆66Apr 17, 2021Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Aug 27, 2018Updated 7 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Jun 25, 2019Updated 6 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆141Apr 4, 2017Updated 8 years ago
- A Bayesian Method for the Induction of Probalistic Networks from Data☆19Jul 6, 2017Updated 8 years ago
- Powershell VNC injector☆341Jun 29, 2020Updated 5 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆996Feb 10, 2019Updated 7 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- Learn from Casey Smith @subTee☆240Jul 18, 2017Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- EternalRocks worm☆468May 25, 2017Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- Teaching old shellcode new tricks☆209Aug 1, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆260Mar 9, 2021Updated 5 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 8 years ago
- Simple Simulator of ARMv6m instructions☆18May 23, 2017Updated 8 years ago
- Stargate☆96Aug 6, 2016Updated 9 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago