☆26Aug 15, 2022Updated 3 years ago
Alternatives and similar repositories for SideLoadHunter
Users that are interested in SideLoadHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Windows Event Log MCP☆46Aug 25, 2025Updated 8 months ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆42Nov 11, 2025Updated 6 months ago
- ☆37May 4, 2026Updated 2 weeks ago
- ☆10Jan 8, 2018Updated 8 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- ☆25Dec 2, 2021Updated 4 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- ☆10Oct 18, 2024Updated last year
- ☆22Jan 31, 2023Updated 3 years ago
- CLI generator for Velociraptor offline collector☆16Apr 20, 2026Updated last month
- Windows C++ Implant for Exploration C2☆48May 11, 2026Updated last week
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆100Oct 13, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆52Jul 6, 2025Updated 10 months ago
- PowerShell script to report the membership of Exchange RBAC role groups☆10Oct 21, 2018Updated 7 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- ☆14Jul 26, 2025Updated 9 months ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Better version of SharpPick☆14Aug 29, 2025Updated 8 months ago
- Collection of my volatility3 plugins☆18Sep 6, 2024Updated last year
- Command line & PPID spoofing☆30Apr 15, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- mpeepdf is a modified version of a powerful Python tool - peepdf to analyze PDF documents☆18Jan 1, 2019Updated 7 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆24Feb 17, 2024Updated 2 years ago
- ☆13Jul 11, 2024Updated last year
- RSS to email script☆11Jul 27, 2012Updated 13 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- IRIS Module to Run Any Velociraptor Artifact☆15Mar 31, 2023Updated 3 years ago
- PowerShell module for PDQ Deploy/Inventory administration.☆12Sep 25, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- .NET Obfuscator designed to protect applications from reverse-engineering through advanced code obfuscation techniques.☆17Dec 31, 2024Updated last year
- Easily create and share Proof of Concepts in HTML, JavaScript, etc. with custom headers, all via query parameters☆14Oct 1, 2025Updated 7 months ago
- ☆19Apr 16, 2026Updated last month
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- HardwareTurningPoint, Fully Go Compatible Hardware Breakpoint☆16Jan 30, 2025Updated last year
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- An implementation of the DNS rebinding attack.☆16Apr 14, 2017Updated 9 years ago