Advanced malware sandbox evasion using C
☆21Jan 23, 2026Updated last month
Alternatives and similar repositories for Malware-Sandbox-Evasion
Users that are interested in Malware-Sandbox-Evasion are comparing it to the libraries listed below
Sorting:
- Pure python Automated wifi deauther☆34May 31, 2025Updated 9 months ago
- A malayalam Programming language created with rust☆21May 19, 2025Updated 9 months ago
- Mass report tool for social media platform Snapchat☆13Mar 14, 2023Updated 2 years ago
- Sends a verify code to your email from microsoft☆13Aug 17, 2025Updated 6 months ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- scrap email from instagram user followers☆12Jul 21, 2023Updated 2 years ago
- KTU S3 Data Structures lab (CSL 201) Programs (2019 - Scheme).☆16Aug 29, 2024Updated last year
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆16May 3, 2024Updated last year
- Embeddable EXI Processor in C☆12Oct 7, 2022Updated 3 years ago
- ☆10Aug 4, 2024Updated last year
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- class materials for MCB517A through UW/Fred Hutch☆12Dec 5, 2019Updated 6 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- FiveM Lua & Web Library | A library for FiveM developers that wraps multiple frameworks, resources and offers extra modules.☆22Feb 24, 2026Updated 2 weeks ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- Convert video to pseudo-hologram video☆10Oct 26, 2021Updated 4 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- This plugin enables buildings from the bikers dlc with weed farms, meth lab, coke lab and a biker club house, they have permission based …☆13Dec 11, 2017Updated 8 years ago
- KaliAI is an advanced AI assistant designed to help security professionals and ethical hackers leverage Kali Linux tools effectively and …☆23Mar 25, 2025Updated 11 months ago
- Remake Of The USB Rubber Ducky In Python With Better Features. Steals IPv4+IPv6 And Other IPs, And Browsing History From: Brave, Microsof…☆14Oct 5, 2024Updated last year
- Documentation -- add more --☆12Jun 17, 2023Updated 2 years ago
- ☆11Jan 5, 2020Updated 6 years ago
- Advanced Rubber Ducky-style HID tool for all Raspberry Pi Pico models with wireless support and enhanced functionality.☆15Nov 8, 2025Updated 4 months ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 8 months ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆10Jun 26, 2024Updated last year
- WIP native Mastodon client for macOS Mojave☆11Jan 29, 2019Updated 7 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- 14,412,680 views•23 Jan 2015 69K 10K SHARE SAVE Dr. Phil 5.85M subscribers Dr. Phil tells compelling stories about real people. Th…☆15Feb 4, 2021Updated 5 years ago
- Build project for all CEDAR Java repositories☆12Oct 20, 2025Updated 4 months ago
- Plugin for Intake to read from SQL servers☆15May 29, 2023Updated 2 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- ☆15Oct 29, 2024Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Scripts aiding penetration testing of Splunk Enterprise systems☆10Jan 29, 2019Updated 7 years ago
- Telegram base free Rat☆13Apr 26, 2025Updated 10 months ago
- This is a simple python binding of Stag Fiducial Marker Detection System☆12Mar 7, 2022Updated 4 years ago