Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
-
Updated
Feb 7, 2019 - C
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
Data EXfiltration TestER
Process name faker for linux/BSD/Unix
ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Float example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux.
ARM 32-bit Raspberry Pi Char Pointer example in Kali Linux.
A tool used to clear Windows Event Logs without invoking wevtutil
Vulnerability to execute a program from a memory overflow on Windows XP for 42 Madrid Cybersecurity Bootcamp.
User/Kernel Mode communication using IOCTL
a stage1 DLL loader with sleep obfuscation
ParadoxiaRat : Native Windows Remote access Tool.
Shellcode Encryption/Decryption using Windows CNG API
Add a description, image, and links to the red-team topic page so that developers can more easily learn about it.
To associate your repository with the red-team topic, visit your repo's landing page and select "manage topics."