ThomasThelen / BrowserLibLinks
A library which makes modification of browsers' behavior easy.
☆10Updated 4 years ago
Alternatives and similar repositories for BrowserLib
Users that are interested in BrowserLib are comparing it to the libraries listed below
Sorting:
- Game Hacking Adventures Scripts & Tools☆20Updated 12 years ago
- Low-level MS Windows registry files analysis tools☆20Updated 9 years ago
- Services and Drivers control application☆19Updated 7 years ago
- A Unix rootkit☆17Updated 4 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- ☆9Updated 8 years ago
- PC Game Modding☆10Updated 3 years ago
- Updated version of ApiTracer Pin tool☆22Updated 7 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 10 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- ☆12Updated 10 years ago
- ☆7Updated 11 years ago
- Windows Syslog Command Line Client☆15Updated 12 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 10 years ago
- Old and probably outdated IDA plugins☆24Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆17Updated 8 years ago
- Continuation of the popular patchdiff IDA plugin☆10Updated 10 years ago
- Monitorowanie API OutputDebugString()☆9Updated 10 years ago
- DLL Injection commandline utility☆26Updated 12 years ago
- ☆20Updated 6 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- wow64 syscall filter☆13Updated 10 years ago
- A simple exploitable ActiveX control for RE/VR☆19Updated 11 years ago
- MBR manipulation tool☆17Updated 11 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Updated 13 years ago
- An idea in hooking APIs by replacing calls that lead to them☆1Updated 2 years ago
- does reflective dll injection☆8Updated 11 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- Change 4 bytes at the end of file to get desired CRC32☆9Updated 7 years ago