☆28Apr 4, 2023Updated 2 years ago
Alternatives and similar repositories for msf_shellcode_analysis
Users that are interested in msf_shellcode_analysis are comparing it to the libraries listed below
Sorting:
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- ☆16Mar 26, 2024Updated last year
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Oct 3, 2023Updated 2 years ago
- sqlmap cheat sheet☆15Apr 6, 2023Updated 2 years ago
- GraalVM NativeImage Decompilation/Reverse Tool☆26Jan 21, 2024Updated 2 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Demo from the Malware Analysis and Development Webinar☆25Apr 17, 2024Updated last year
- ☆11Feb 12, 2023Updated 3 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- ☆94May 26, 2023Updated 2 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Random CVEs☆34May 10, 2025Updated 10 months ago
- ☆13Jan 27, 2024Updated 2 years ago
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- A simple UEFI bootkit made by @NSG650 and me.☆26Dec 29, 2024Updated last year
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆35Jul 12, 2021Updated 4 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 11 months ago
- macOS shellcode loader written in Objective-C☆49Jul 15, 2022Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Jul 23, 2024Updated last year
- Youtube channel sample code☆55Mar 14, 2026Updated last week