wiire-a / CVE-2017-9476
Hidden AP with Deterministic Credentials
☆9Updated 7 years ago
Alternatives and similar repositories for CVE-2017-9476
Users that are interested in CVE-2017-9476 are comparing it to the libraries listed below
Sorting:
- Debugger for HTC phones bootloader (HBOOT).☆19Updated 11 years ago
- dll injection library☆9Updated 10 years ago
- Shellcode tracer☆15Updated 8 years ago
- ☆7Updated 11 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Updated 9 years ago
- My metasploit modules☆11Updated 9 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- User-mode part of Zerokit platform☆20Updated 6 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Updated 7 years ago
- Download youtube video cover image.☆7Updated 7 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- wow64 syscall filter☆13Updated 10 years ago
- Web Based Crypter☆7Updated 11 years ago
- does reflective dll injection☆8Updated 11 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- ☆9Updated 7 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- UAC Copy Tool☆9Updated 9 years ago
- A small python module to manipulate Windows Internals Process Monitor PMF Filter files☆15Updated 6 years ago
- Zerokit server controller☆13Updated 6 years ago
- Capture Webcam Reflective Dll☆8Updated 9 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆14Updated 10 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆13Updated 9 years ago
- Cross-referencing network communication for detecting Advanced Persistent Threat (APT) malware☆6Updated 9 years ago
- Simple Shellcode development/injection on macOS☆11Updated 7 years ago