co3moz / pe-coff-viewerView external linksLinks
View pe coff files with browsers.
☆17May 14, 2020Updated 5 years ago
Alternatives and similar repositories for pe-coff-viewer
Users that are interested in pe-coff-viewer are comparing it to the libraries listed below
Sorting:
- Open source knight online server typescript implementation☆34Jun 30, 2025Updated 7 months ago
- Social Limiter google extension☆12Mar 4, 2022Updated 3 years ago
- Final ve Büt için krem niteliğinde☆10Nov 15, 2017Updated 8 years ago
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 4 months ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- Java 14 Features☆13Oct 12, 2020Updated 5 years ago
- not working!☆11Oct 7, 2015Updated 10 years ago
- Lightweight request control middleware for Express 4☆10Nov 22, 2015Updated 10 years ago
- A lightweight Docker Developer Interface for Docker Remote API☆148Sep 21, 2021Updated 4 years ago
- Visualizes Java Module Graph☆15Jun 13, 2018Updated 7 years ago
- Vectored Exception Handling Squared☆29Dec 27, 2025Updated last month
- Knight Online texture file to transparent supported png converter☆15Jun 14, 2021Updated 4 years ago
- A web interface for saü sözlük☆15Jan 11, 2023Updated 3 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated 11 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Aug 25, 2025Updated 5 months ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51May 16, 2025Updated 8 months ago
- Plants Vs Zombies 2 Version 3.8.1 - In Game Menu + 11☆10Aug 28, 2015Updated 10 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- A dataset migration tool from MongoDB to Elasticsearch and vice versa.☆138May 21, 2021Updated 4 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆37Oct 21, 2020Updated 5 years ago
- ☆11Mar 4, 2023Updated 2 years ago
- A Node.js net.Socket that automatically reconnects on close events☆15Feb 13, 2015Updated 11 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- Windows Protected Process Light toggle tool — dynamically finds offsets and patches EPROCESS using RTCore64☆66May 2, 2025Updated 9 months ago
- jQuery FriendURL plugin☆16Jun 4, 2023Updated 2 years ago
- [Chrome Extension] Categorizing your mixed GitHub notifications per repository.☆11Jul 2, 2017Updated 8 years ago
- ☆13Apr 6, 2017Updated 8 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 10 months ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- Advanced PDF parsing for python☆12Jan 21, 2025Updated last year
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- ☆15Sep 2, 2024Updated last year
- ☆12Mar 15, 2020Updated 5 years ago