Java Algorithms for Competitive Programming
☆10Feb 6, 2020Updated 6 years ago
Alternatives and similar repositories for CP-Algorithms
Users that are interested in CP-Algorithms are comparing it to the libraries listed below
Sorting:
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 4 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- DLL Unhooking☆13Mar 26, 2021Updated 4 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- Ghidra is a software reverse engineering (SRE) framework☆13Feb 20, 2026Updated last week
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- The Visual Computing Library☆20Feb 12, 2026Updated 2 weeks ago
- ☆14May 27, 2022Updated 3 years ago
- Vulnerable docker images for CVE-2021-41773☆23Oct 6, 2021Updated 4 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- ☆17Sep 20, 2022Updated 3 years ago
- This is created for updating Various Viruses, malware, and all! Also new kind for vulnerability and attacks!☆13Jun 6, 2021Updated 4 years ago
- An online secure decentralized voting system on the ethereum blockchain, which uses facial recognition and OTP for authentication☆15Aug 27, 2019Updated 6 years ago
- The MacOS ransomware project☆14Jun 24, 2017Updated 8 years ago
- Pure-Python low-level PDF manipulation library☆14Jan 29, 2022Updated 4 years ago
- Stop Windows Defender programmatically☆15Jan 17, 2022Updated 4 years ago
- Iterate over Windows Handles☆15Nov 18, 2025Updated 3 months ago
- impersonate trustedinstaller by fiddling with tokens☆17Aug 30, 2021Updated 4 years ago
- Rust Weaponization for Red Team Engagements.☆15Oct 9, 2021Updated 4 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- Load ssp dll golang implementation☆19Jan 18, 2022Updated 4 years ago
- Anti-VM, malware sandbox detection and evasion.☆14Jun 13, 2022Updated 3 years ago
- Like Hell's Gate but more EGG :)☆20Mar 11, 2022Updated 3 years ago
- Bash implementation of CVE-2021-4034☆15Jan 26, 2022Updated 4 years ago
- A versatile and highly concurrent malware written in golang.☆20Jul 2, 2021Updated 4 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Mar 23, 2022Updated 3 years ago
- Golang Simple Anti Debugger & Anti Http Debugger☆21Nov 7, 2021Updated 4 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆27Apr 28, 2022Updated 3 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- SoapySDR plugin for remotely accessing SpyServer devices☆26Nov 27, 2022Updated 3 years ago
- DPX - the Doge Packer for eXecutables☆30Dec 21, 2021Updated 4 years ago
- ☆24Jun 29, 2021Updated 4 years ago
- Repository of vulnerabilities disclosed by ESET☆29Jul 13, 2022Updated 3 years ago
- Build [ani/tachi]yomi extensions without a PC.☆30May 26, 2024Updated last year
- Golang Trojan☆20Mar 15, 2017Updated 8 years ago