Links from X Posts
☆130Mar 20, 2026Updated this week
Alternatives and similar repositories for XLinks
Users that are interested in XLinks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- ☆22Sep 20, 2025Updated 6 months ago
- ☆12Jun 24, 2023Updated 2 years ago
- windows rpc 使用MIDL+RPC实现HelloWorld☆23Mar 21, 2018Updated 8 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A powerful proxy checker that checks and evaluates proxies for speed, availability, and anonymity across multiple protocols (HTTP, HTTPS,…☆12Oct 31, 2025Updated 4 months ago
- A web application testing tool built for capturing and modifying http/https requests.☆16Oct 15, 2025Updated 5 months ago
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆24Mar 16, 2025Updated last year
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 3 months ago
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆52Jun 16, 2025Updated 9 months ago
- CoreFoundation Lite, ported to Android. Helps port iOS apps to NDK.☆13Jul 5, 2013Updated 12 years ago
- An Apple Silicon hooking library written in C☆13Sep 19, 2021Updated 4 years ago
- Demo of LoadLibrary function with C++ in Win32 API☆11Jul 12, 2023Updated 2 years ago
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 10 months ago
- Gives medals to TOR relays☆10Jan 23, 2017Updated 9 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- collection of blogs about malware development and analysis☆74Dec 2, 2025Updated 3 months ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 4 months ago
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated last year
- Script for automating multiple word files to be used with Hashcat☆11Apr 9, 2024Updated last year
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated 2 months ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated last year
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆54Sep 19, 2025Updated 6 months ago
- 2016 NOLA Fellowship project | A mobile-first website that acts as a digital one-pager for the workforce system in New Orleans, reducing …☆10Jan 7, 2019Updated 7 years ago
- Undocumented way of fetching list of processes by bruteforcing NtQuerySystemInformation☆16Nov 20, 2017Updated 8 years ago
- ☆36Aug 21, 2024Updated last year
- Reasonably undetected shellcode stager and executer.☆35May 23, 2025Updated 10 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- It's Lenny - Tropo Implementation☆15Apr 17, 2016Updated 9 years ago
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆18Feb 23, 2026Updated last month
- Burp Suite Professional Edition .☆19Jul 24, 2025Updated 8 months ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- A simple android LiveData alternative for WPF and C#☆13Apr 23, 2022Updated 3 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Nov 15, 2015Updated 10 years ago
- Collection of various WINAPI tricks / features used or abused by Malware☆13Mar 28, 2022Updated 3 years ago
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- A collection of intel and usernames scraped from various cybercrime sources & forums. DarkForums, HackForums, Patched, Cracked, BreachFor…☆171Updated this week