A tool for creating proxy dll for hijacking
☆42Oct 28, 2024Updated last year
Alternatives and similar repositories for ProxyJacker
Users that are interested in ProxyJacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository contains an online education portal filled with web vulnerabilities.☆21Jan 3, 2020Updated 6 years ago
- SSL Pinning bypass using frida server for Mobile Application Penetration Testing☆15Jan 6, 2021Updated 5 years ago
- ☆14Oct 1, 2021Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Bare template for a Kernel Mode Driver☆51Mar 10, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- Poc for CVE-2019-1253☆155Dec 23, 2021Updated 4 years ago
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 9 months ago
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- Shellcode library as a Go package☆70Nov 1, 2019Updated 6 years ago
- Chrome cookie dumper☆18Jan 27, 2021Updated 5 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆18Jul 24, 2022Updated 3 years ago
- A Chrome cookie dumping utility☆46Feb 21, 2020Updated 6 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 5 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆126May 9, 2023Updated 2 years ago
- Keep track of changes in website with WEBSY☆35May 22, 2023Updated 2 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- Simple tool to test for SSRF/OOB HTTP Read within the Path of a request☆30Aug 2, 2019Updated 6 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 6 years ago
- All known and unknown public POC's for wordpress themes and plugins☆79Jun 23, 2021Updated 4 years ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- ☆52Mar 30, 2026Updated 2 weeks ago
- ☆90Oct 17, 2020Updated 5 years ago
- ☆105Feb 11, 2026Updated 2 months ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆241Aug 12, 2020Updated 5 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆218Dec 8, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Go tool to obfuscate and deobfuscate the code and file.☆13May 29, 2022Updated 3 years ago
- ☆22Aug 11, 2021Updated 4 years ago
- ☆24Apr 28, 2024Updated last year
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆76Mar 8, 2019Updated 7 years ago
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- C# Lsass parser☆296Oct 13, 2021Updated 4 years ago
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Oct 1, 2020Updated 5 years ago