CLI utility for scanning user-mode process memory.
☆129Jan 7, 2018Updated 8 years ago
Alternatives and similar repositories for memscan
Users that are interested in memscan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script for spoofing network adapter's MAC address on Windows.☆187Jan 6, 2016Updated 10 years ago
- Solutions to bioinformatics problems.☆27Feb 2, 2016Updated 10 years ago
- Game bot for the MMORPG MapleStory v62.☆75Jan 6, 2016Updated 10 years ago
- Quick hack for making real work happen.☆1,553Mar 30, 2024Updated 2 years ago
- Faker is a PHP library that generates fake data for you☆11May 5, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Past Exams for Past Berkeley EECS Courses. Please add more if you have any!☆54Mar 22, 2016Updated 10 years ago
- سورس کد سمینار ارشد من درباره پخش اطلاعات در شبکههای اجتماعی☆16May 20, 2018Updated 7 years ago
- Ask Me Anything at https://discourse.opengenus.org/☆11Nov 14, 2016Updated 9 years ago
- MIPS Processor simulator and debugger written in C#.☆12Feb 1, 2015Updated 11 years ago
- It likes everything☆21Aug 2, 2017Updated 8 years ago
- wow64 syscall filter☆14Nov 12, 2014Updated 11 years ago
- Start playing TWMS without browser.☆10May 29, 2015Updated 10 years ago
- A terminal client for linux. powered with python.☆17Feb 20, 2021Updated 5 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆12Feb 17, 2018Updated 8 years ago
- vm for a dynamically typed language☆35Aug 11, 2017Updated 8 years ago
- Hashids, ported for Perl☆17Dec 17, 2020Updated 5 years ago
- The internal Windows structures hack to create the in-process private ETW session☆14Feb 22, 2017Updated 9 years ago
- rsmware forked C#/PHP/MySQL☆14Apr 27, 2017Updated 9 years ago
- A minimal Bash framework and CLI tool that makes writing, sharing and using bash scripts easy☆12Apr 23, 2026Updated last week
- use delay/sleep/wait to async/await ES7☆12Jul 21, 2016Updated 9 years ago
- TLS Protocol implementation for node.js☆39Feb 8, 2015Updated 11 years ago
- Automatic ROP chain generator☆12Mar 29, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Ph4nt0m Webzine☆40Mar 21, 2015Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Tools and library to manipulate EFI variables.☆10Apr 21, 2026Updated last week
- ETW Tracing C++ project☆16Oct 2, 2020Updated 5 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Telegram Chatbot with Artificial Intelligence using AIML (Spanish) as core.☆11Sep 2, 2016Updated 9 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- Super small container (3MB) based on Routers OpenWRT Linux OS☆60Mar 3, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- Simple Perl interface for Google+☆13Aug 27, 2013Updated 12 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- This repository contains a collection of C++ and CUDA programming experiments, learning projects, and problem-solving exercises.☆10Sep 24, 2025Updated 7 months ago
- Like spark, but vertical☆35May 13, 2016Updated 9 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago