System Call Integrity Layer - experimental security research
☆25Jan 31, 2026Updated last month
Alternatives and similar repositories for Scil
Users that are interested in Scil are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- ☆19Jan 8, 2026Updated 2 months ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated 11 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆20Dec 3, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Command Augmentation support for BOFs and .NET assemblies across agents☆42Mar 17, 2026Updated last week
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 4 months ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- A C# tool for extracting information from SCCM PXE boot media.☆51Jan 14, 2026Updated 2 months ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- ☆59Dec 10, 2025Updated 3 months ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 8 months ago
- ComfyUI custom nodes for Foundation-1 | Structured Text-to-Sample Diffusion for Music Production☆67Updated this week
- A Windows C++ OLE/COM Object explorer written in WTL.☆16Feb 28, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆66Mar 1, 2025Updated last year
- A few examples of how to trap virtual memory access on Windows.☆42Dec 18, 2024Updated last year
- Open source implementation of Warcraft 3☆37Mar 8, 2026Updated 2 weeks ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- Beacon Debugger☆55Oct 28, 2024Updated last year
- ☆28Jan 17, 2026Updated 2 months ago
- A Payload Analysis Framework☆116Oct 9, 2025Updated 5 months ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆54Oct 6, 2025Updated 5 months ago
- ☆22Jan 15, 2025Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- A C# utility for interacting with SCOM☆97Dec 2, 2025Updated 3 months ago
- Different tools for Microsoft Hyper-V researching☆64Mar 9, 2026Updated 2 weeks ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Utilizng an MCP Server to communicate with your C2☆88May 15, 2025Updated 10 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This is my own implementation of the Perun's Fart technique by Sektor7☆72May 14, 2022Updated 3 years ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆139Apr 6, 2025Updated 11 months ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆39Jul 23, 2025Updated 8 months ago
- Gemini4IDA: Gemini for IDA disassembly and program analysis☆13Dec 29, 2023Updated 2 years ago
- Exploitation of CVE-2025-29969☆57Feb 20, 2026Updated last month