Simple flask application with a Bootstrap front-end for playing with netconf.
☆14Dec 21, 2020Updated 5 years ago
Alternatives and similar repositories for flask-netconf
Users that are interested in flask-netconf are comparing it to the libraries listed below
Sorting:
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Aug 11, 2023Updated 2 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆13May 30, 2024Updated last year
- Windows file system driver which allows to block access to files at run-time (C/C++, C#, WDK, SDK)☆13Jan 1, 2023Updated 3 years ago
- ☆11Jun 24, 2024Updated last year
- ☆20Feb 22, 2021Updated 5 years ago
- A c++, QT gui based memory engine☆13Mar 6, 2018Updated 8 years ago
- ☆13Mar 29, 2021Updated 4 years ago
- Comparison table of VMX capabilities for a bunch of processors☆13Nov 3, 2020Updated 5 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- The lightweight UEFI toolchain for Visual Studio (MSBuild) C++ projects☆12Feb 16, 2026Updated last month
- displays processes, modules and memory layout☆17Aug 4, 2020Updated 5 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- An example code of CiGetCertPublisherName☆16Mar 24, 2022Updated 3 years ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- bootkit驱动映射,三环进程注入加载指定模块☆14Oct 8, 2024Updated last year
- 从admin冲到TrustedInstaller☆17Feb 3, 2023Updated 3 years ago
- Yet another windows syscall library☆18Jun 22, 2020Updated 5 years ago
- Programming/scripting language☆18Jan 3, 2025Updated last year
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Sep 13, 2016Updated 9 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- ☆16May 15, 2021Updated 4 years ago
- Demo projects using virt86☆13Jul 5, 2019Updated 6 years ago
- Lightweight, dependency-free x86-64 CPU emulation library with Unicorn-like guest mode and direct host-memory execution.☆69Updated this week
- Testing sharing between D3D11 and D3D12 devices☆14Jun 6, 2022Updated 3 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- C++ Vulkan project featuring compute based occlusion and frustum culling together with indirect draw. Done during my year off in 2021, fo…☆11Mar 23, 2022Updated 3 years ago
- Joker Botnet Source LEAKED☆10Jun 5, 2021Updated 4 years ago
- A remote 64bit application proc call helper for Wow64(win32 on win64) application.☆11Jan 26, 2022Updated 4 years ago
- Easy DWM switcher without Winlogon suspension☆18Jan 30, 2024Updated 2 years ago
- simply manual map any system image☆18Feb 1, 2021Updated 5 years ago
- Popular driver source with guarded regions bypass☆15Nov 12, 2022Updated 3 years ago
- CS 1.6 Multihack. Attemp to develop and improve Nor-Adrenaline.☆28Jan 14, 2019Updated 7 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- ☆29Jan 15, 2021Updated 5 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago