xnohat / WebShellLinks
WebShell Collect
☆14Updated 9 years ago
Alternatives and similar repositories for WebShell
Users that are interested in WebShell are comparing it to the libraries listed below
Sorting:
- xnohat DDoS Firewall based on iptables☆32Updated 8 years ago
- A minimalistic packer designed to pack executables. Useful to compress executables or hide malware from early detection☆9Updated 2 weeks ago
- WinEoP Exploitation Framework☆24Updated 9 years ago
- A project to learn about malware and c++ coding☆22Updated 9 years ago
- ☆24Updated 8 years ago
- ☆8Updated 2 years ago
- ☆11Updated 8 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆13Updated 9 years ago
- A simple B/S based RAT,developed with C#(for server) and php(for browser)☆11Updated 12 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- Ida Pro plugin that supports debugging with the anergistic spu emulator☆13Updated 9 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- implementation of some concepts in Security and Exploiting☆13Updated 9 years ago
- Vietnamese Password Dicts☆57Updated 11 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Updated 10 years ago
- ☆12Updated 10 years ago
- This project has been moved from a private repository☆26Updated 7 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 9 years ago
- Ioncube 8 decoder. Discontinued.☆111Updated 8 years ago
- 微软7月布丁增加内存延迟释放机制☆11Updated 10 years ago
- ☆43Updated 7 years ago
- Prototype for an in memory fuzzer☆13Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- metasploit loader with antivirus bypass module☆17Updated 9 years ago
- ☆13Updated 8 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆14Updated 11 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago