CANAPE Network Testing Tool
☆34Sep 25, 2018Updated 7 years ago
Alternatives and similar repositories for canape
Users that are interested in canape are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A network proxy library written in C# for .NET Core based on CANAPE☆191Aug 19, 2023Updated 2 years ago
- Workshop material for a Windows Attack Surface Analysis Workshop☆68May 1, 2019Updated 6 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆139Aug 3, 2017Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Aug 21, 2014Updated 11 years ago
- CANAPE Network Testing Tool☆184Jan 18, 2018Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- Python Remote Administration Tool☆15Jan 8, 2017Updated 9 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 8 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 6 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- ☆19Sep 15, 2021Updated 4 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆92Oct 14, 2014Updated 11 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 8 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- A simple Script which tests for LFI (Local File Inclusion) via Curl☆15Mar 11, 2019Updated 7 years ago
- All in one tool for ethical hacking and pen testing.☆13May 22, 2023Updated 2 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/lfimap☆16Mar 5, 2016Updated 10 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆16Dec 8, 2022Updated 3 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- AlMA.PRO.SPY - An open-source Botnet.☆15Jul 25, 2017Updated 8 years ago
- LFI (Local File Inclusion) Exploitation Tool☆17Jan 4, 2021Updated 5 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆85Dec 23, 2010Updated 15 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago