fdvoid0's Projects
As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more. https://twitter.com/httpie
Take a list of domains and probe for working HTTP and HTTPS servers
A lightweight DNS-over-HTTPS proxy.
Encrypted PE Loader Generator
华域数广Reporter组件GetShell / Code By:Tas9er
A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)
hvpp is a lightweight Intel x64/VT-x hypervisor written in C++ focused primarily on virtualization of already running operating system
HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.
A toolkit for embedding hypervisor capabilities in your application
Some hypervisor research notes. There is also a useful exploit template that you can use to verify / falsify any assumptions you may make while auditing code, and for exploit development.
Tool to deploy a post-exploitation prompt at any time
Simple reverse ICMP shell
Transparently tunnel your IP traffic through ICMP echo and reply packets.
Instrument Cluster Simulator
Gather sensitive information from (.idea) folder for pentesters
Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.
A trojan client for Android (UNDER CONSTRUCTION).
OWASP iGoat - A Learning Tool for iOS App Pentesting and Security by Swaroop Yermalkar
iis6 exploit 2017 CVE-2017-7269
Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.
:foggy: Convert image to ASCII
Imaging is a simple image processing package for Go
A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM.
Impacket is a collection of Python classes for working with network protocols.
:bomb: Impulse Denial-of-service ToolKit
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Template-Driven AV/EDR Evasion Framework