wille / native-tear
Clone of hidden tear written in C++
☆69Updated 4 years ago
Alternatives and similar repositories for native-tear:
Users that are interested in native-tear are comparing it to the libraries listed below
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- ☆73Updated 2 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆69Updated 10 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 4 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆60Updated 9 years ago
- some pocs for antivirus evasion☆130Updated last year
- Exploiting MS15-061 local Privilege escalation☆50Updated 9 years ago
- ☆127Updated 9 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- Tinba Banking Trojan☆84Updated 10 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆127Updated 8 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆117Updated 2 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆214Updated 4 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆96Updated 12 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 9 years ago
- public bugs/proof of concepts☆48Updated 4 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- a linux process hacker tool☆83Updated 5 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆98Updated 5 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 6 years ago
- windows kernel vulnerability found by me☆91Updated 7 years ago