Lists (1)
Sort Name ascending (A-Z)
Stars
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
ading2210 / doompdf
Forked from ozkl/doomgenericA port of Doom (1993) that runs inside a PDF file
A repository for learning various heap exploitation techniques.
💔 Hearbleed exploit to retrieve sensitive information CVE-2014-0160 💔
Malware to gain persistence on a victims machine.
LibZeroEvil & the Research Rootkit project.
A Tutorial how to get started with Linux Kernel Modules and Linux Drivers.
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
Python utility for parsing Xamarin AssemblyStore blob files
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…
Load a statically-linked ELF binary(x86 architecture) without the execve syscall.
Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…
Connect like there is no firewall. Securely.
🎯 An aimbot that uses Yolov5 and PyTorch to play CS:GO
Tool for performing SNMP scanning accross wide swaths of IP ranges
A malicious LDAP server for JNDI injection attacks
Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.
Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)