Next generation !
☆69Jan 24, 2021Updated 5 years ago
Alternatives and similar repositories for Unhide-NG
Users that are interested in Unhide-NG are comparing it to the libraries listed below
Sorting:
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆17Dec 6, 2015Updated 10 years ago
- Cymothoa is a backdooring tool, that inject backdoor's shellcode directly into running applications. Stealth and lightweight...☆18Aug 24, 2015Updated 10 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- load macho files in memory without touching the Disk☆43Sep 16, 2022Updated 3 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- A minimal Lua socket library for unix / tcp / udp connections☆10Apr 21, 2024Updated last year
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- executing JS from x86 code☆27May 9, 2019Updated 6 years ago
- Listing UDP connections with remote address without sniffing.☆31Sep 26, 2023Updated 2 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- Use md5-collisions to make evil executables looking like a good one.☆34Apr 23, 2020Updated 5 years ago
- ☆11Feb 8, 2026Updated 3 weeks ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Feb 9, 2020Updated 6 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- enable libemu run pe file and add some good modify☆14Feb 4, 2019Updated 7 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- DLL and API hooking example to hide running in a Terminal Session☆21Jun 5, 2020Updated 5 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- POC viruses I have created to demo some ideas☆59Apr 12, 2020Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Jun 4, 2019Updated 6 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year