A tool for creating proxy dll for hijacking
☆42Oct 28, 2024Updated last year
Alternatives and similar repositories for ProxyJacker
Users that are interested in ProxyJacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository contains an online education portal filled with web vulnerabilities.☆21Jan 3, 2020Updated 6 years ago
- ☆14Oct 1, 2021Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Bare template for a Kernel Mode Driver☆51Mar 10, 2020Updated 6 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Poc for CVE-2019-1253☆155Dec 23, 2021Updated 4 years ago
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 9 months ago
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- Shellcode library as a Go package☆70Nov 1, 2019Updated 6 years ago
- Chrome cookie dumper☆18Jan 27, 2021Updated 5 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 3 years ago
- A Chrome cookie dumping utility☆46Feb 21, 2020Updated 6 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆126May 9, 2023Updated 3 years ago
- Keep track of changes in website with WEBSY☆35May 22, 2023Updated 2 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- Simple tool to test for SSRF/OOB HTTP Read within the Path of a request☆30Aug 2, 2019Updated 6 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated last year
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 6 years ago
- All known and unknown public POC's for wordpress themes and plugins☆79Jun 23, 2021Updated 4 years ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Read Navicat 12 Password☆19Jun 7, 2020Updated 5 years ago
- ☆52Mar 30, 2026Updated last month
- ☆90Oct 17, 2020Updated 5 years ago
- ☆108Feb 11, 2026Updated 2 months ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆241Aug 12, 2020Updated 5 years ago
- Reflective DLL loading of your favorite Golang program☆174Jan 27, 2020Updated 6 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆218Dec 8, 2022Updated 3 years ago
- A Go tool to obfuscate and deobfuscate the code and file.☆13May 29, 2022Updated 3 years ago
- ☆22Aug 11, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆24Apr 28, 2024Updated 2 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆76Mar 8, 2019Updated 7 years ago
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- C# Lsass parser☆297Oct 13, 2021Updated 4 years ago
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Oct 1, 2020Updated 5 years ago
- cve-2020-0688 UNIVERSAL Python implementation utilizing ASPX webshell for command output☆24Sep 12, 2023Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago