☆15Feb 20, 2026Updated last week
Alternatives and similar repositories for CryptoLectures
Users that are interested in CryptoLectures are comparing it to the libraries listed below
Sorting:
- Various dll hollowing techniques☆10Feb 29, 2024Updated 2 years ago
- IDA plugin to Display Mach-O headers☆21Nov 4, 2011Updated 14 years ago
- eCos 3.0 RTOS, with Xiilinx Zynq and NXP Vybrid support and other additions☆19Jul 4, 2016Updated 9 years ago
- Unused DLL hollowing PoC in Nim☆17Jan 31, 2022Updated 4 years ago
- Superion Mutator for AFLPlusPlus☆31Dec 5, 2023Updated 2 years ago
- A reader for Serilog's compact JSON format☆34Dec 10, 2024Updated last year
- ☆34Dec 21, 2023Updated 2 years ago
- A PoC Mach-O infector via library injection☆65Mar 5, 2013Updated 12 years ago
- Serilog.Sinks.Postgresql.Alternative is a library to save logging information from https://github.com/serilog/serilog to https://www.post…☆77Mar 27, 2025Updated 11 months ago
- EFI DXE Emulator and Interactive Debugger☆94Apr 13, 2020Updated 5 years ago
- Monitor changes in Active Directory with replication metadata☆91Jul 9, 2024Updated last year
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆163Jan 23, 2026Updated last month
- ☆116Feb 29, 2024Updated 2 years ago
- A Mythic agent for Windows written in C☆156Updated this week
- Chaos.NaCl cryptography library☆142Oct 13, 2021Updated 4 years ago
- Set of antianalysis techniques found in malware☆133Aug 25, 2023Updated 2 years ago
- ☆159Apr 4, 2025Updated 10 months ago
- Compact JSON event format for Serilog☆163Jun 9, 2024Updated last year
- 👓A collection of papers/tools/exploits for UEFI security.☆212Sep 4, 2025Updated 5 months ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆189May 21, 2021Updated 4 years ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆331Jan 14, 2026Updated last month
- ☆231Jun 10, 2025Updated 8 months ago
- A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.☆213Oct 10, 2025Updated 4 months ago
- ☆245Feb 19, 2026Updated last week
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆261Feb 21, 2025Updated last year
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- ☆223Apr 7, 2023Updated 2 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆252Jun 22, 2020Updated 5 years ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆436Jun 27, 2025Updated 8 months ago
- A cross platform tool to read & query JSON aka CLEF log files created by Serilog☆253Aug 1, 2024Updated last year
- Source Generator and .NET 8 UnsafeAccessor based high-performance strongly-typed private accessor for unit testing and runtime.☆251May 27, 2024Updated last year
- AdaptixFramework Extension Kit☆421Feb 16, 2026Updated last week
- Some scripts for IDA Pro to assist with reverse engineering EFI binaries☆306May 23, 2019Updated 6 years ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆357Jan 8, 2026Updated last month
- A Binary Ninja plugin for vulnerability research.☆299Sep 7, 2024Updated last year
- A library that simplifies intercepting application function calls using managed code and the .NET Core runtime☆287Jul 1, 2025Updated 7 months ago
- Stealthily inject shellcode into an executable☆452Oct 19, 2025Updated 4 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆305Sep 7, 2022Updated 3 years ago