AWilliams17 / MonoJabberView external linksLinks
It's a CLI Unity DLL Injector.
☆12Aug 8, 2019Updated 6 years ago
Alternatives and similar repositories for MonoJabber
Users that are interested in MonoJabber are comparing it to the libraries listed below
Sorting:
- A wrapper for memory hacking related functions (WriteProcessMemory, ReadProcessMemory, etc) as well as a DLL injection function and patte…☆17May 29, 2020Updated 5 years ago
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- Subdomain finder☆10Mar 13, 2025Updated 11 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Aug 19, 2021Updated 4 years ago
- burpplugin 根据一遍神贴,实现了一下burp插件版本的小刀,一键生成shell☆14Jul 15, 2019Updated 6 years ago
- CTF Challenge☆18Nov 20, 2020Updated 5 years ago
- ☆17Jan 27, 2022Updated 4 years ago
- Skywalking远程代码执行漏洞验证☆19Feb 22, 2021Updated 4 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- ☆15Jan 15, 2026Updated 3 weeks ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23May 24, 2020Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆23Aug 18, 2021Updated 4 years ago
- Automate the process of an S3 bucket subdomain takeover via dangling CNAME record☆26May 20, 2024Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Some CTF Write-ups☆26Feb 7, 2022Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆28Nov 15, 2020Updated 5 years ago
- shw's CTF challenges☆27Apr 5, 2021Updated 4 years ago
- 这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但希望坚持下去,加油!☆30Feb 17, 2020Updated 5 years ago
- Kernel mode to user mode dll injection.☆14Nov 10, 2024Updated last year
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Sep 2, 2021Updated 4 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆35Aug 21, 2023Updated 2 years ago
- GUI Kernel driver process protect tool☆38Jul 13, 2018Updated 7 years ago
- jre8u20 gadget☆34May 23, 2021Updated 4 years ago
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- UNTOUCHED Unity debugging dlls backup from https://github.com/dnSpy/dnSpy-Unity-mono☆38Mar 28, 2023Updated 2 years ago
- nProtect GameGuard☆34Feb 21, 2021Updated 4 years ago
- ☆10Mar 19, 2019Updated 6 years ago
- Check the release tabs for newer versions☆11Aug 21, 2023Updated 2 years ago
- Convert PE files to a shellcode☆80May 7, 2020Updated 5 years ago
- 二维码扫描、生成☆11Sep 6, 2013Updated 12 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- ☆13Apr 21, 2021Updated 4 years ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆103Oct 7, 2024Updated last year
- Windows 反射式注入DLL☆35Dec 8, 2018Updated 7 years ago
- Generate DOM clobbering attack vectors for you.☆35Jun 3, 2025Updated 8 months ago