Protect domains from malicious browser extensions
☆17Apr 16, 2025Updated 11 months ago
Alternatives and similar repositories for DomainProtect
Users that are interested in DomainProtect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- Turning Your Computer Into a GPS Tracker With Apple Maps☆18Feb 6, 2024Updated 2 years ago
- Scrappy script scraping robot☆36Apr 2, 2021Updated 4 years ago
- Demeuk is a simple tool to clean up corpora (like dictionaries) or any dataset containing plain text strings.☆21Aug 6, 2025Updated 7 months ago
- ☆11Nov 27, 2021Updated 4 years ago
- Example showing how to run a LLM fully inside an AWS Lambda Function☆23Jan 13, 2024Updated 2 years ago
- Windows Minidump loader for Ghidra☆29Sep 30, 2022Updated 3 years ago
- LPE exploit for CVE-2023-36802☆25Oct 10, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- Resize observer hooks for Dioxus 🧬☆12Dec 15, 2024Updated last year
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- Call VmProtect functions directly from your Tauri WebView.☆13Jan 31, 2026Updated last month
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Linux Process Injection via Seccomp Notifier☆84Dec 9, 2025Updated 3 months ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- ☆11Feb 12, 2023Updated 3 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆11Nov 6, 2022Updated 3 years ago
- An IDA plugin to deobfuscate Pikabot's strings using RC4 and AES☆13Apr 8, 2024Updated last year
- Statistics from our binary transformation framework☆12Jan 16, 2025Updated last year
- Generate DOM clobbering attack vectors for you.☆35Jun 3, 2025Updated 9 months ago
- Kill Bill Stripe demo☆10Aug 10, 2025Updated 7 months ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- ☆13Oct 21, 2023Updated 2 years ago
- poc code for CVE-2024-38080☆30Sep 1, 2024Updated last year
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- A backendless, offline-capable, collision-free, emoji-based URL shortener for the Edge.☆16Aug 28, 2023Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago