binophism / processinjection-via-syscallLinks
☆16Updated 5 months ago
Alternatives and similar repositories for processinjection-via-syscall
Users that are interested in processinjection-via-syscall are comparing it to the libraries listed below
Sorting:
- Intrusion Testing And Intra-Network Attacks Framework☆8Updated 4 years ago
- Dorsa Lab Vulnerable Web Application☆21Updated 2 years ago
- my write-ups for flareon7☆27Updated 4 years ago
- رایتاپهای تیم فلگ موتوری☆27Updated last month
- SBLoader is a memory patcher to patch and execute the child process under the desired parent process.☆14Updated 3 years ago
- This repository is related to specialized books published by the THB team.☆14Updated last month
- Framework for generating audit commands for Unix security audits☆66Updated last year
- Ai000-Rostam (Codename: Ritchie Blackmoore) is a penetration testing tool for windows infrastructure that has been developing by Ai000 Cy…☆11Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 9 months ago
- Subscene subtitle list cleaner☆17Updated last year
- (new released v2.5 LTS.2022-06-25) It has focused on developing an All in One operating system for programming, designing and data scienc…☆64Updated last year
- the assembly shell and backdoor Trojan☆18Updated 3 years ago
- Hamster Glitch script☆7Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆25Updated 9 months ago
- A place in which I put various resources from my classes, presentations, and videos.☆44Updated last year
- a plugin to calculate complexity of executable's functions☆18Updated 3 years ago
- MAZAPA Writeups - RedTeam Based Peetrochemical Network for Attack☆11Updated last year
- Exploit of RealVNC VNC Server☆28Updated 2 years ago
- simple tool for finding javascript files from webapps☆10Updated 2 years ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆13Updated 6 months ago
- A Python-based Data Analysis Tool for Examining and Visualizing Weather Patterns in Tehran. Utilizes Historical Weather Data to Provide I…☆15Updated 2 weeks ago
- ☆29Updated last year
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆24Updated 3 months ago
- log4jshell vulnerability scanner for bug bounty☆23Updated 3 years ago
- A tool for steganography of png files .☆24Updated 2 years ago
- ☆20Updated last year
- Xegtor - Network Attack And Scanning Tool☆24Updated 3 months ago
- Obfuscate UDP traffic as RTP☆19Updated last year
- Laravel Package for the ArCaptcha☆12Updated 11 months ago
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆28Updated last month