vmutilscross platform library to manipulate and extract information of memory regions
Stars: ✭ 22 (-94.98%)
PhpmusselPHP-based anti-virus anti-trojan anti-malware solution.
Stars: ✭ 337 (-23.06%)
hardwareGet CPU, Memory and Network informations of the running OS and its processes
Stars: ✭ 70 (-84.02%)
pydevmemPython interface to /dev/mem
Stars: ✭ 41 (-90.64%)
FlameCordPatch for Waterfall to improve performance during attacks and fix memory issues.
Stars: ✭ 103 (-76.48%)
memtesterSimple memory tester mirror from http://pyropus.ca/software/memtester/. Please note that I am not the author of Memtester
Stars: ✭ 84 (-80.82%)
RVMRcore Virtual Machine
Stars: ✭ 59 (-86.53%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (-4.34%)
Simple-Antirootkit-SST-UnhookerThis is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks
Stars: ✭ 31 (-92.92%)
Umbraco-RCEUmbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
Stars: ✭ 61 (-86.07%)
dualnbackIn n-back task you need to remember n previous spatial or auditory stimuli. N-back is a memory test where n refers on how many previous stimuli must be remembered. Dual means that verbal auditory stimulus and spatial visual stimulus are presented at the same time and must be remembered separately.
Stars: ✭ 22 (-94.98%)
mindavA self-hosted file backup server which bridges WebDAV protocol with @minio written in @totoval. Webdav ❤️ Minio
Stars: ✭ 64 (-85.39%)
doonaNetwork based protocol fuzzer
Stars: ✭ 64 (-85.39%)
getroot🛠️ Tool to bypass my school's security system to get sudo privileges on MacOS
Stars: ✭ 34 (-92.24%)
GtfoSearch gtfobins and lolbas files from your terminal
Stars: ✭ 336 (-23.29%)
memoryMemory game 🎴
Stars: ✭ 24 (-94.52%)
numapNo description or website provided.
Stars: ✭ 18 (-95.89%)
slimarraySlimArray compresses uint32 into several bits, by using a polynomial to describe overall trend of an array.
Stars: ✭ 39 (-91.1%)
CVE-2018-7750an RCE (remote command execution) approach of CVE-2018-7750
Stars: ✭ 18 (-95.89%)
BrahmaBrahma - Privilege elevation exploit for Nintendo 3DS
Stars: ✭ 34 (-92.24%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-95.66%)
Struts PwnAn exploit for Apache Struts CVE-2017-5638
Stars: ✭ 391 (-10.73%)
purelovePurelove is a lightweight penetration testing framework, in order to better security testers testing holes with use.
Stars: ✭ 52 (-88.13%)
discord-bugs-exploitsA Collection of Various Discord Bugs, Exploits, Un-Documented Parts of the Discord API, and Other Discord Related Miscellaneous Stuff.
Stars: ✭ 22 (-94.98%)
Drupalgeddon3Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
Stars: ✭ 18 (-95.89%)
csharp-workshopNDC London 2019, Workshop: Become a better C# programmer: more Value, more Expressions, no Waiting
Stars: ✭ 21 (-95.21%)
rkorovald_preload userland rootkit
Stars: ✭ 34 (-92.24%)
checkmateTraining neural networks in TensorFlow 2.0 with 5x less memory
Stars: ✭ 116 (-73.52%)
JsshellAn interactive multi-user web JS shell
Stars: ✭ 330 (-24.66%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (-71%)
psutilCross-platform lib for process and system monitoring in Python
Stars: ✭ 8,488 (+1837.9%)
IAT APIAssembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
Stars: ✭ 63 (-85.62%)
EternalblueEternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010
Stars: ✭ 150 (-65.75%)
cache-bucketLight Cache for nodeJs and browserJs with TTL.
Stars: ✭ 14 (-96.8%)
padreBlazing fast, advanced Padding Oracle exploit
Stars: ✭ 35 (-92.01%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (-67.58%)
DeauthdetectorDetect deauthentication frames using an ESP8266
Stars: ✭ 406 (-7.31%)
string-combinationsA simple, low-memory footprint function to generate all string combinations from a series of characters.
Stars: ✭ 25 (-94.29%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (-79.68%)
http-authNode.js package for HTTP basic and digest access authentication.
Stars: ✭ 364 (-16.89%)
cve-2016-1764Extraction of iMessage Data via XSS
Stars: ✭ 52 (-88.13%)
codezeroCodezero Microkernel
Stars: ✭ 93 (-78.77%)
AmonguscaptureCapture of the local Among Us executable state
Stars: ✭ 252 (-42.47%)
HideprocessA basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager
Stars: ✭ 329 (-24.89%)
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (-80.82%)
PocOrExp in Github聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
Stars: ✭ 544 (+24.2%)
CVE-2019-8449CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Stars: ✭ 66 (-84.93%)
RootMyTV.github.ioRootMyTV is a user-friendly exploit for rooting/jailbreaking LG webOS smart TVs.
Stars: ✭ 745 (+70.09%)
Scriptsafea browser extension to bring security and privacy to chrome, firefox, and opera
Stars: ✭ 434 (-0.91%)
IceboxVirtual Machine Introspection, Tracing & Debugging
Stars: ✭ 422 (-3.65%)
YsoserialA proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Stars: ✭ 4,808 (+997.72%)
Http AuthNode.js package for HTTP basic and digest access authentication.
Stars: ✭ 355 (-18.95%)