3gstudent / PNG-SteganographyView external linksLinks
Steganography Payload
☆47Jul 18, 2017Updated 8 years ago
Alternatives and similar repositories for PNG-Steganography
Users that are interested in PNG-Steganography are comparing it to the libraries listed below
Sorting:
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- powershell to hide process by kd.exe☆31Apr 17, 2021Updated 4 years ago
- Powershell to CodeExecution and ProcessInjection☆65Jul 18, 2017Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- 一款http协议的漏洞扫描框架☆27Jan 17, 2020Updated 6 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- ☆18Feb 4, 2016Updated 10 years ago
- PoC of a protected process causing a blue screen if killed.☆15Jul 31, 2018Updated 7 years ago
- source&exe☆38Jul 18, 2017Updated 8 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- interesting analysis☆16May 14, 2018Updated 7 years ago
- Repository For CTF Write-ups☆17Sep 11, 2023Updated 2 years ago
- A tool implementing process hollowing making your PE polymorphic☆16Aug 11, 2020Updated 5 years ago
- Windows Malware monitors and infects specific kinds of files.☆18Sep 24, 2019Updated 6 years ago
- ☆72Jan 27, 2014Updated 12 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆17Nov 4, 2012Updated 13 years ago
- I'll post some malware analysis from time to time.☆24Apr 3, 2021Updated 4 years ago
- DotNetObfuscator☆17Dec 24, 2016Updated 9 years ago
- ☆22Apr 23, 2024Updated last year
- Dll injector POC for new handle stealing technique☆21Oct 8, 2017Updated 8 years ago
- 背景: https://weibo.com/5084870733/E6GfkarzQ☆21Jun 17, 2017Updated 8 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- ☆24Jul 6, 2018Updated 7 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Remove a digital signature from DLL, EXE...☆26Sep 11, 2014Updated 11 years ago
- Hansel - a simple but flexible search for IDA☆26Jul 11, 2019Updated 6 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 8 years ago
- Add my own POC to test Visual Studio trick to run code when building☆22Jul 18, 2017Updated 8 years ago
- ☆58Aug 31, 2018Updated 7 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆59Mar 8, 2018Updated 7 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆24Mar 26, 2017Updated 8 years ago
- C# Codedom example / builder☆24Mar 8, 2020Updated 5 years ago
- Attack data☆26Apr 20, 2018Updated 7 years ago
- ☆55Jul 18, 2017Updated 8 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆60Aug 4, 2017Updated 8 years ago