Some example of code for proxy dll
☆33Apr 23, 2019Updated 6 years ago
Alternatives and similar repositories for ProxyDll
Users that are interested in ProxyDll are comparing it to the libraries listed below
Sorting:
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- A slightly safer io access library☆14Sep 20, 2021Updated 4 years ago
- MySQL function to create a KSUID☆12Mar 7, 2021Updated 5 years ago
- Alternative Windows C runtime for minimal binary size☆38Apr 9, 2016Updated 9 years ago
- Go package to handle configuration parameters☆12May 19, 2025Updated 10 months ago
- ☆12Jan 10, 2025Updated last year
- A simple Node.js keylogger for Windows and macOS☆14Mar 30, 2022Updated 3 years ago
- ☆26Sep 29, 2022Updated 3 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Ruby ALPC Fuzzer ( joke )☆24Oct 12, 2014Updated 11 years ago
- Your own cloud player☆23May 30, 2025Updated 9 months ago
- A manual PE mapping implementation, aka reflective loader☆21Feb 28, 2026Updated 3 weeks ago
- A simple plugin for working with Swift Strings, optimized Swift Strings, and Swift Arrays during the reverse engineering of iOS binaries …☆22Jun 5, 2025Updated 9 months ago
- ☆23May 23, 2024Updated last year
- Collection of DLL function export forwards for DLL export function proxying☆103Aug 21, 2025Updated 7 months ago
- Ryzen Timing Checker in C#☆15Dec 28, 2019Updated 6 years ago
- GDI+ graphics library for AutoHotkey v2 to create beautiful 2D graphics or render animations.☆22Apr 14, 2025Updated 11 months ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- This is a public repo for gRPC Demo using .NET 7☆12Nov 13, 2022Updated 3 years ago
- C IPC (over Unix Domain Sockets) API☆17Apr 18, 2016Updated 9 years ago
- Fuzzy search tool for IDA Pro (Update)☆12Mar 18, 2024Updated 2 years ago
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- ☆20Nov 8, 2020Updated 5 years ago
- Exploiting DLL Hijacking by DLL Proxying Super Easily☆554Jul 9, 2023Updated 2 years ago
- Hyperledger Kubernetes deploy using powerful template system☆11Oct 13, 2020Updated 5 years ago
- Demo of using Airflow☆11Jun 24, 2022Updated 3 years ago
- ☆15Jul 13, 2023Updated 2 years ago
- PE Analyzer utility tool☆14Oct 21, 2020Updated 5 years ago
- Packet Logger / Decryptor in Network Layer via WinDivert.☆29Apr 24, 2022Updated 3 years ago
- Labyrinth, an LLVM obfuscation plugin for the New Pass Manager☆44Feb 23, 2025Updated last year
- C# Unmanaged Array Library🍓☆23Mar 25, 2021Updated 4 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- Simple portforwarder for monitor traffic, detect patterns and replace response.☆24Nov 4, 2022Updated 3 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated last year
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year