Venipa / SAMLinks
Steam Account Manager / Switcher
☆11Updated 2 years ago
Alternatives and similar repositories for SAM
Users that are interested in SAM are comparing it to the libraries listed below
Sorting:
- Hello everyone, I am posting the malware injection poc video that I detected on 7-zip, just like in WinRAR. It's your choice to believe o…☆9Updated 3 years ago
- Collection of IDA helpers☆16Updated 2 years ago
- Tool to extract contents from the memory of Windows systems.☆14Updated 2 years ago
- A tool to show the method info at runtime☆13Updated 5 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆15Updated last year
- Make more then 100k r/s with HTTP Sockets☆11Updated 5 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆14Updated 3 years ago
- A Node.js module for deobfuscating and expanding DOS/BATCH commands.☆12Updated 6 years ago
- Files related to video tutorials from my YouTube channel!☆12Updated 6 years ago
- MBR virus☆23Updated 4 years ago
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Updated 3 years ago
- ☆11Updated 6 years ago
- ☆11Updated 4 years ago
- NRefactory - Refactoring Your C# Code☆15Updated last year
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Updated 2 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 3 years ago
- Similar to server sided variables and used to download files without giving away a direct download URL.☆16Updated 4 years ago
- de4dot mod by HTC & Ngôn Nguyễn☆28Updated 4 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Updated 4 years ago
- shouganaiyo-loader is a cross-platform Frida-based Node.js command-line tool that forces Java processes to load a Java/JVMTI agent regard…☆34Updated 3 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- Tools for analyzing Windows containers and break container's isolation☆32Updated 2 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- UAC via computerdefaults.exe☆12Updated 3 months ago
- Windows Minidump loader for Ghidra☆29Updated 2 years ago
- Protect domains from malicious browser extensions☆16Updated 3 months ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆10Updated 2 years ago
- AppContainerBypass☆21Updated 4 years ago
- Obfuscate specific windows apis with different apis☆12Updated 11 months ago