tiny wrapper around Windows Management Instrumentation API
☆13Nov 9, 2018Updated 7 years ago
Alternatives and similar repositories for wmi
Users that are interested in wmi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jul 27, 2020Updated 5 years ago
- python library for dumping a linux process from memory☆34Jun 15, 2010Updated 15 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- ☆16May 6, 2015Updated 10 years ago
- Module for decompressing aPLib compressed data☆17Aug 25, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- protected is used for creating "protected" connections that bypass Android's VPNService☆11Apr 19, 2024Updated last year
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- a State-Machine reversing exercise☆13Apr 22, 2021Updated 4 years ago
- 修改Windows路由表,实现VPN类软件分流(类似游戏加速器)☆10Jun 24, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- a IDA plugin helps you to manage your IDA Comments☆25Sep 30, 2024Updated last year
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Nov 20, 2015Updated 10 years ago
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Jun 17, 2020Updated 5 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50May 12, 2022Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 2 months ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Sandbox evasion code snippets developped in Golang☆20Sep 19, 2022Updated 3 years ago
- Go bindings for CEF (Chromium Embedded Framework)☆21Aug 18, 2023Updated 2 years ago
- ☆16Dec 17, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 蓝莺 IM SDK,Web版,PC浏览器☆17Sep 25, 2025Updated 6 months ago
- An open source simple game framework that I use for my own games.☆60Sep 28, 2010Updated 15 years ago
- In-memory security with secure data types☆16Aug 20, 2020Updated 5 years ago
- Backdoor with Golang (Cross-Plateform)☆17Feb 17, 2022Updated 4 years ago
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago
- HTML5 Command Line Terminal☆18May 25, 2017Updated 8 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- rtsp client☆17Dec 15, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Go Lang Portable Executable Parser☆39Mar 31, 2021Updated 4 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Dec 27, 2022Updated 3 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- Reflectively load PE☆106Aug 4, 2020Updated 5 years ago
- decrypt all of the wifi key from Old and Current interface Profile in Windows☆14Apr 8, 2020Updated 5 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34May 21, 2019Updated 6 years ago
- ☆41Jul 4, 2018Updated 7 years ago