A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.
☆16Feb 27, 2024Updated 2 years ago
Alternatives and similar repositories for Peep
Users that are interested in Peep are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Heap encryption in Nim☆21Aug 25, 2024Updated last year
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆40Mar 6, 2025Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- socksh(v3.0) automatically scrapes socks5 proxies from spyones list and can then also add alive proxies to proxychains.conf file in matte…☆14Aug 9, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆22Nov 4, 2024Updated last year
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆36Feb 27, 2025Updated last year
- CVE-2024-40711-exp☆43Oct 17, 2024Updated last year
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- Hack South is a South Africa-based community for infosec professionals, security researchers, and students sharing insights, advice, and …☆14Nov 16, 2024Updated last year
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated 3 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- Checks if files is accessible based on the source code.☆16Mar 13, 2024Updated 2 years ago
- ☆12Feb 19, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- binary instrumentation, analysis, and patching framework☆104Feb 20, 2026Updated last month
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆45Apr 27, 2023Updated 2 years ago
- Agentic LLM CTF to test prompt injection attacks and preventions☆30Apr 3, 2026Updated last week
- ☆48Jun 6, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 3 months ago
- ☆39Oct 9, 2025Updated 6 months ago
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year
- My implementation of Halo's Gate technique in C#☆55Apr 20, 2022Updated 3 years ago
- ☆26Mar 10, 2022Updated 4 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Oct 29, 2021Updated 4 years ago
- KslDump — Why bring your own knife when Defender already left one in the kitchen?☆296Mar 17, 2026Updated 3 weeks ago
- ☆46Nov 14, 2020Updated 5 years ago
- Windows Network File System Remote exploit for CVE-2022-30136☆15Jul 11, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Apr 10, 2022Updated 4 years ago
- Create file system symbolic links from low privileged user accounts within PowerShell☆95Jun 20, 2022Updated 3 years ago
- Halos Gate-based NTAPI Unhooker☆52Apr 21, 2022Updated 3 years ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- ☆73Jan 1, 2026Updated 3 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 7 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 5 months ago