Simple and sane compression wrapper library.
☆19Oct 28, 2022Updated 3 years ago
Alternatives and similar repositories for AdvSim.Compression
Users that are interested in AdvSim.Compression are comparing it to the libraries listed below
Sorting:
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Simple and sane cryptographic wrapper library.☆33Apr 21, 2023Updated 2 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Jun 2, 2021Updated 4 years ago
- A library to hook functions !☆18Dec 2, 2021Updated 4 years ago
- miscellaneous scripts and programs☆277Jan 23, 2025Updated last year
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Managed code hooking template.☆135Nov 19, 2021Updated 4 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Convert native dll to shellcode, and support exported function☆25Feb 10, 2021Updated 5 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆140Sep 12, 2022Updated 3 years ago
- A library for interacting with Windows through SMB written in Nim.☆17Sep 14, 2025Updated 6 months ago
- ☆10Mar 15, 2017Updated 9 years ago
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Apr 10, 2022Updated 3 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- Rust Weaponization for Red Team Engagements.☆15Oct 9, 2021Updated 4 years ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆198Dec 6, 2022Updated 3 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- Read Memory without ReadProcessMemory for Current Process☆92Feb 13, 2022Updated 4 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Oct 29, 2021Updated 4 years ago
- Join the REVEN community. Ask questions, talk about reverse engineering, discuss REVEN, and show off your work!☆13Nov 30, 2021Updated 4 years ago
- Malware?☆77Oct 26, 2025Updated 4 months ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated last year
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆85Dec 20, 2019Updated 6 years ago
- Learning Process Injection and Hollowing techniques☆42Jun 26, 2022Updated 3 years ago
- OSINT Resources for Politics☆14Aug 13, 2018Updated 7 years ago