☆11May 24, 2017Updated 8 years ago
Alternatives and similar repositories for regsvr32
Users that are interested in regsvr32 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rerousces related to time-travel debugging (TTD)☆36Jan 6, 2026Updated 2 months ago
- PHP 8 Sandbox Escape☆71Feb 28, 2026Updated last month
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- ASCII Smuggling Hidden Prompt Injection is a novel approach to hacking AI assistants using Unicode Tags. This project demostrate how to u…☆18Aug 7, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- Secure Internet Voting protocol☆19Updated this week
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Jun 8, 2017Updated 8 years ago
- ☆24Dec 23, 2021Updated 4 years ago
- powershell免杀混淆器,简单有效。A simple and effective powershell obfuscaiton tool bypass Anti-Virus☆19Dec 2, 2022Updated 3 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- ☆10Dec 16, 2024Updated last year
- Hikvision camera backdoor exploit for beef framework (hikvision versions 5.2.0 - 5.3.9)☆20Aug 12, 2020Updated 5 years ago
- ☆13Apr 22, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 8 years ago
- Use Waitfor.exe to maintain persistence☆55Apr 17, 2021Updated 4 years ago
- OpenRASP Agent容器编译环境,助力二次开发。☆12Apr 28, 2022Updated 3 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆142May 23, 2020Updated 5 years ago
- 各种安全相关思维导图整理收集☆11Feb 13, 2017Updated 9 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Jar Protector - Jar Crypter☆15May 18, 2018Updated 7 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- libLNK is a c++ library for creating Windows shortcuts (*.lnk files)☆28Apr 21, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- x86 Microkernel☆16Apr 1, 2020Updated 5 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- ☆11Sep 18, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- Archlinux ARM docker repository☆11May 11, 2020Updated 5 years ago
- The media stream extraction tool☆25Nov 23, 2013Updated 12 years ago
- A simple shsh get script☆13Aug 28, 2019Updated 6 years ago
- jxwaf-mini server☆11Mar 28, 2025Updated last year
- ☆12Jan 13, 2018Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Parseltongue 3.1 - LLM Payload Crafter for AI safety research☆86Nov 14, 2025Updated 4 months ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- ☆16May 6, 2015Updated 10 years ago
- TDOA Implementation for indoor location tracking using DWM1000 modules☆11May 10, 2022Updated 3 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- ☆16Jul 7, 2020Updated 5 years ago