Runtime Process Manipulation
☆241Nov 21, 2024Updated last year
Alternatives and similar repositories for mayhem
Users that are interested in mayhem are comparing it to the libraries listed below
Sorting:
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Reflective Polymorphism☆109Jun 29, 2018Updated 7 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆220Dec 11, 2017Updated 8 years ago
- Interactive shellcoding environment to easily craft shellcodes☆909Feb 26, 2021Updated 5 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆523May 23, 2025Updated 9 months ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Mar 20, 2021Updated 5 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Apr 13, 2018Updated 7 years ago
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 7 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Jun 18, 2018Updated 7 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Apr 13, 2017Updated 8 years ago
- ☆408Mar 1, 2017Updated 9 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- ☆229May 10, 2018Updated 7 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- ARM Shellcode Generator☆105Aug 26, 2017Updated 8 years ago
- TrueType and OpenType font fuzzing toolset☆438Aug 28, 2019Updated 6 years ago
- UAC 0Day all day!☆57Aug 15, 2017Updated 8 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆761Jan 28, 2019Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- Encrypted exploit delivery for the masses☆271Sep 25, 2019Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago