Library For Creating Local & Remote Procedure Calls Between Different Running Processes
☆79Mar 15, 2024Updated 2 years ago
Alternatives and similar repositories for rlpclib
Users that are interested in rlpclib are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Key Calculation Based Program For Data Confidentiality Over A Steganography-Like Technique Using The ROT Algorithm☆23Dec 22, 2021Updated 4 years ago
- Linux-Based Reverse Shell Builder For Linux Penetration Testers☆42Nov 12, 2021Updated 4 years ago
- Multiple Of Scripts Useful For System Administration In Linux Servers & Distributions, Driven By a Fast Easy-to-Use Menu Script☆53Dec 22, 2021Updated 4 years ago
- Cleny is An Interpreted Coding Language Used To Facilitate UI Structuring And Styling For CLI Based Projects☆109Dec 30, 2022Updated 3 years ago
- Input/Output Assembly Header coded by me.☆10Sep 30, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Open source linux-based-toolkit for basic cyber security students, social engineers, linux users....☆22Oct 2, 2023Updated 2 years ago
- Moverse's Official Website☆10Mar 14, 2022Updated 4 years ago
- These are some books that will help you in your learning,I got them in my cyber security career, These books for: pentesting, programming…☆90Apr 7, 2022Updated 4 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Apr 27, 2020Updated 6 years ago
- Understanding some of the Anti-Reversing Techniques☆12Oct 6, 2019Updated 6 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Jun 23, 2022Updated 3 years ago
- A collection of techniques commonly used in malware to accomplish core tasks.☆83Jun 15, 2019Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Oct 28, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Project that aims to let student teams write their own virus which must not be detected by team self-developped antivirus.☆13Mar 19, 2013Updated 13 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 5 years ago
- anything I find interesting regarding reverse engineering☆12May 7, 2017Updated 9 years ago
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆539Jan 4, 2026Updated 4 months ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Jun 30, 2023Updated 2 years ago
- Open-Source Ransomware Project for learning purpose only written in C# (csharp). Dont use it for bad things.☆89May 2, 2024Updated 2 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆18Sep 7, 2019Updated 6 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆100Mar 27, 2022Updated 4 years ago
- A simple polymorphic virus that changes its signature whenever it replicates☆12Aug 27, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Malware and malicious applications database☆38Jun 12, 2024Updated last year
- ☆15Aug 17, 2023Updated 2 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Process Hollowing demonstration & explanation☆36Feb 25, 2021Updated 5 years ago
- A Bumblebee-inspired Crypter☆80Dec 5, 2022Updated 3 years ago
- Curated resources for malware analysis, reverse engineering, and defensive security research.☆1,726Apr 1, 2026Updated last month
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Sep 15, 2022Updated 3 years ago
- KNSoft.NDK provides native C/C++ definitions and import libraries for Windows NT.☆23Apr 24, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago
- This is a RAT/Backdoor written in C++☆42Dec 30, 2020Updated 5 years ago
- Penetration Test / Read Team - C# tools repository☆54Dec 23, 2021Updated 4 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- A micro:bit entry-level Reverse Engineering tutorial code repo which was presented at the 2021 micro:bit LIVE event.☆12Nov 27, 2025Updated 5 months ago
- Educational lab project exploring secure remote session design, authentication flows, logging, and detection considerations. Built for de…☆175Jul 22, 2023Updated 2 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago