Thesirix / StreakMaster
☆1Updated this week
Alternatives and similar repositories for StreakMaster:
Users that are interested in StreakMaster are comparing it to the libraries listed below
- This repository contains full code examples from the book Gray Hat C#☆388Updated 3 years ago
- Resources About Windows Security. 1100+ Open Source Tools. 3300+ Blog Post and Videos.☆489Updated 5 years ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,337Updated last month
- Post-exploitation tool for hiding processes from monitoring applications☆739Updated last year
- Resources to help get started with IoT Pentesting☆165Updated 6 years ago
- eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)☆466Updated last year
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆2,894Updated 2 years ago
- Exploiting DLL Hijacking by DLL Proxying Super Easily☆497Updated last year
- The program is designed to obfuscate the shellcode.☆201Updated 3 years ago
- DLL Injection tool to unlock guest VMs☆234Updated 12 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆520Updated 6 years ago
- Detects DLL hijacking in running processes on Windows systems☆156Updated 10 years ago
- AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.☆386Updated 5 years ago
- Scripts featured in the book How to Hack Like a Legend☆139Updated 2 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,113Updated 5 months ago
- .NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins.☆712Updated 4 years ago
- windows kernel security development☆1,997Updated 2 years ago
- Evade sysmon and windows event logging☆622Updated 5 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆351Updated 3 years ago
- This program is designed to demonstrate various process injection techniques☆1,136Updated last year
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆199Updated 3 years ago
- Writing custom backdoor payloads with C# - Defcon 27 Workshop☆1,139Updated 3 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆541Updated 4 years ago
- DLL Hijacking Detection Tool☆515Updated 5 years ago
- Simple PoC demonstrating syscall execution in C#☆154Updated 4 years ago
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆790Updated 4 years ago
- The Windows Kernel Programming book samples☆627Updated last year
- Converts a DLL into EXE☆808Updated last year
- SharpSploit is a .NET post-exploitation library written in C#☆1,789Updated 3 years ago
- TCP Port Redirection Utility☆712Updated 2 years ago