DEMON1A / BrocmonLinks
Modified version of Process monitor that bypasses procmon detection for anti-debuggers
☆22Updated last year
Alternatives and similar repositories for Brocmon
Users that are interested in Brocmon are comparing it to the libraries listed below
Sorting:
- Vulnerabilities you my miss during a penetration testing.☆97Updated last year
- ☆226Updated 10 months ago
- Notes, Lab Commands and Vulnerability Information for BSCP Exam Prep☆47Updated 2 years ago
- CVE-2025-29927 Proof of Concept☆96Updated 10 months ago
- Everything from my OSEP study.☆184Updated 3 weeks ago
- A list of all Active Directory machines from HackTheBox☆210Updated 2 months ago
- Generate Frida bypass scripts for Android APK root and SSL checks.☆194Updated 7 months ago
- Noxer is a powerful Python script designed for automating Android penetration testing tasks within the Nox Player emulator.☆286Updated 2 years ago
- An Android app to easily manage Frida server on your device or emulator☆105Updated 3 weeks ago
- Web Application Penetration Testing☆144Updated 8 months ago
- Most of the notes, resources and scripts I used to prepare for the HTB CPTS and "pass it the 2 time."☆63Updated 2 years ago
- some of the commands I usually use when doing HTB machines☆49Updated 2 years ago
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆97Updated last week
- Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/A…☆22Updated last week
- High-Performance JavaScript Security Scanner - Process 1M URLs in ~5 hours with Telegram & Discord bot integration, Docker support, and c…☆171Updated 3 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆100Updated 3 weeks ago
- ☆12Updated 5 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆120Updated 3 years ago
- Some Useful Tricks for Pentest Android and iOS Apps☆158Updated 2 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆327Updated 3 months ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆414Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆432Updated 8 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆163Updated 8 months ago
- A powerful Burp Suite extension that imports Postman collections☆31Updated 5 months ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆265Updated last year
- My Private Bug Hunting Methodology☆315Updated last year
- A powerful pentesting tool for proactive detection and exploitation of dependency confusion vulnerabilities in Node.js projects. Enhance …☆13Updated 2 years ago
- ☆82Updated 7 months ago
- A Powerful Recon Engine☆68Updated last year