NDevTK / DomainProtectLinks
Protect domains from malicious browser extensions
☆16Updated 3 months ago
Alternatives and similar repositories for DomainProtect
Users that are interested in DomainProtect are comparing it to the libraries listed below
Sorting:
- VBScript minifier☆24Updated 5 months ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- module for certexfil☆15Updated 3 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- ☆28Updated 6 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 11 months ago
- Spoof parent process ID☆13Updated 6 years ago
- ☆8Updated 9 months ago
- A tool to check for response status codes with ease☆14Updated 2 years ago
- Windows 10 Telemetry Group Policy Pack☆17Updated 6 years ago
- A Burp extension to enable modification of FIX messages when relayed from MitM_Relay☆15Updated 2 years ago
- Tool to extract contents from the memory of Windows systems.☆14Updated 2 years ago
- ☆23Updated last year
- 「🚪」The hidden hookless backdoor☆13Updated 7 months ago
- ☆19Updated 2 years ago
- Some ELF Malwares☆10Updated 3 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 5 months ago
- Collection of IDA helpers☆16Updated 2 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- UAC via computerdefaults.exe☆12Updated 3 months ago
- Tools for analyzing Windows containers and break container's isolation☆32Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- Random Tips and Writeups.☆15Updated 6 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆12Updated last year
- Password reader for Mozilla Firefox and Thunderbird☆23Updated 5 years ago
- Use md5-collisions to make evil executables looking like a good one.☆30Updated 5 years ago