System Call Integrity Layer - experimental security research
☆25Jan 31, 2026Updated last month
Alternatives and similar repositories for Scil
Users that are interested in Scil are comparing it to the libraries listed below
Sorting:
- A C# tool for extracting information from SCCM PXE boot media.☆51Jan 14, 2026Updated last month
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- ☆58Dec 10, 2025Updated 2 months ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated 11 months ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- A Windows C++ OLE/COM Object explorer written in WTL.☆16Feb 28, 2025Updated last year
- A C# utility for interacting with SCOM☆96Dec 2, 2025Updated 3 months ago
- A few examples of how to trap virtual memory access on Windows.☆41Dec 18, 2024Updated last year
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- ☆22Jan 15, 2025Updated last year
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆20Dec 3, 2024Updated last year
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Feb 17, 2026Updated 2 weeks ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- ☆54Oct 6, 2025Updated 4 months ago
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 4 months ago
- IDA Pro plugin to aid with the analysis of native IIS modules☆21Aug 1, 2024Updated last year
- ☆55May 31, 2025Updated 9 months ago
- Title is self explaining, well theres few methods we can do to read locked file and play with it...☆96Jan 5, 2026Updated 2 months ago
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆65Mar 1, 2025Updated last year
- Beacon Debugger☆55Oct 28, 2024Updated last year
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆38Jul 23, 2025Updated 7 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- ☆27Jan 17, 2026Updated last month
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Open source implementation of Warcraft 3☆35Feb 22, 2026Updated last week
- A Payload Analysis Framework☆117Oct 9, 2025Updated 4 months ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- collection of blogs about malware development and analysis☆65Dec 2, 2025Updated 3 months ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 5 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆128Jan 28, 2026Updated last month
- ☆48Nov 26, 2025Updated 3 months ago
- Different tools for Microsoft Hyper-V researching☆64Feb 26, 2026Updated last week