☆25Dec 7, 2024Updated last year
Alternatives and similar repositories for Windows-Defender-DLL-Hijacking
Users that are interested in Windows-Defender-DLL-Hijacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mind-Maps of Several Things☆12Dec 22, 2021Updated 4 years ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆11Jun 2, 2023Updated 2 years ago
- ☆11May 30, 2021Updated 4 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆16Aug 16, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆21Jul 26, 2022Updated 3 years ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 3 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 10 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Apr 20, 2026Updated last week
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- DDos attack☆13Feb 13, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- All my POC related to malware development☆15Feb 19, 2026Updated 2 months ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆17Oct 25, 2024Updated last year
- Packet Analysis on Steroids☆14Oct 20, 2022Updated 3 years ago
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago
- ☆41Jul 30, 2023Updated 2 years ago
- SHELLCTF 2021 WriteUps. A beginner-friendly CTF with an objective to get the enthusiastic students familiar with the basics, along with a…☆12Jun 7, 2021Updated 4 years ago
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago
- random scripts☆17Nov 10, 2024Updated last year
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Apr 17, 2021Updated 5 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago
- Exploring different process injection techniques based on malware analysis☆14Dec 28, 2023Updated 2 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆24Feb 17, 2024Updated 2 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- Multi-threading wget golang☆13Mar 13, 2024Updated 2 years ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 7 months ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆28Jun 2, 2024Updated last year
- ☆10Dec 16, 2017Updated 8 years ago
- Gitbook: kashz-Jewels☆20Jul 1, 2025Updated 9 months ago