A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.
☆15Feb 27, 2024Updated 2 years ago
Alternatives and similar repositories for Peep
Users that are interested in Peep are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆40Mar 6, 2025Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- socksh(v3.0) automatically scrapes socks5 proxies from spyones list and can then also add alive proxies to proxychains.conf file in matte…☆14Aug 9, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆22Nov 4, 2024Updated last year
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆36Feb 27, 2025Updated last year
- CVE-2024-40711-exp☆43Oct 17, 2024Updated last year
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- Hack South is a South Africa-based community for infosec professionals, security researchers, and students sharing insights, advice, and …☆14Nov 16, 2024Updated last year
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated 3 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- Checks if files is accessible based on the source code.☆16Mar 13, 2024Updated 2 years ago
- ☆12Feb 19, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- binary instrumentation, analysis, and patching framework☆102Feb 20, 2026Updated last month
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 11 months ago
- ☆108Aug 21, 2024Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆45Apr 27, 2023Updated 2 years ago
- Agentic LLM CTF to test prompt injection attacks and preventions☆30Mar 17, 2026Updated last week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆48Jun 6, 2025Updated 9 months ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year
- My implementation of Halo's Gate technique in C#☆54Apr 20, 2022Updated 3 years ago
- ☆26Mar 10, 2022Updated 4 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Oct 29, 2021Updated 4 years ago
- Create file system symbolic links from low privileged user accounts within PowerShell