exploit of smt proxyoverflow bug, i.e. CVE-2018–10376
☆10May 4, 2018Updated 7 years ago
Alternatives and similar repositories for Exploit_SMT_ProxyOverflow
Users that are interested in Exploit_SMT_ProxyOverflow are comparing it to the libraries listed below
Sorting:
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- firewall for windows 8☆18Dec 16, 2013Updated 12 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆46Jun 10, 2016Updated 9 years ago
- Slides of 44Con 2018☆22Oct 11, 2018Updated 7 years ago
- CVE-2017-12149 JBOSS as 6.X反序列化(反弹shell版)☆22Nov 22, 2017Updated 8 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Nov 18, 2017Updated 8 years ago
- 第三届阿里云安全算法挑战赛☆37Jul 6, 2023Updated 2 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- driver interface with dll-injection capabilities☆28Nov 5, 2020Updated 5 years ago
- ☆27Mar 8, 2018Updated 7 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- Google Project Zero OS X Vul Report Analysis☆32Apr 5, 2017Updated 8 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- dump lsass tool☆38Oct 10, 2022Updated 3 years ago
- Script for pentest☆39Oct 14, 2020Updated 5 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Dota Auto Chess Picker is a utility for planning your strategy☆11Oct 1, 2020Updated 5 years ago
- Exploit for LG Q710ULM (Stylo 4 AMZ variant) for writing arbitrary contents to eMMC and patching aboot via S-EL3 warmboot takeover☆14Jan 4, 2021Updated 5 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Feb 14, 2017Updated 9 years ago
- API for data transmission and retrieval from Monero applications through the Microsoft .NET Framework☆10Jan 16, 2017Updated 9 years ago
- POC for CVE-2018-0824☆88Oct 18, 2022Updated 3 years ago
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago