details about DIAL protocol vulnerabilities
☆29Nov 24, 2023Updated 2 years ago
Alternatives and similar repositories for DIALStranger
Users that are interested in DIALStranger are comparing it to the libraries listed below
Sorting:
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- ☆26Jan 7, 2024Updated 2 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 10 months ago
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 3 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Dec 8, 2023Updated 2 years ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated last year
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- Automatically fuzz Rust projects from scratch☆59Jul 8, 2025Updated 7 months ago
- ☆83May 9, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- ☆16Oct 18, 2024Updated last year
- ☆19Nov 26, 2024Updated last year
- Take domains on stdin and output them on stdout if they get resolved☆32May 27, 2022Updated 3 years ago
- ☆38Jan 6, 2025Updated last year
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Integer overflow in FreeType software, which also affects Chrome☆28Aug 27, 2025Updated 6 months ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 9 months ago
- ☆114Jan 8, 2025Updated last year
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago