Run one process as another under Windows
☆11Jul 23, 2022Updated 3 years ago
Alternatives and similar repositories for process_replacement
Users that are interested in process_replacement are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hooking vtables☆10Jul 23, 2022Updated 3 years ago
- Diffing process heaps☆15Jul 23, 2022Updated 3 years ago
- Winsock inspection/filtering/modifying☆20Jul 23, 2022Updated 3 years ago
- PE Infector/Cryptor source code☆20Jul 23, 2022Updated 3 years ago
- Runtime DirectX9 Hooking☆16Jul 23, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- ☆12Jun 24, 2017Updated 8 years ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Bash script for checking HTTP headers for security☆17Jan 16, 2014Updated 12 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆31Aug 13, 2015Updated 10 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Dec 2, 2016Updated 9 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 12 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- utilities☆15Jul 2, 2013Updated 12 years ago
- Rust binding for Keystone assembler framework☆11Dec 9, 2018Updated 7 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- A REPL for the Android Debug Bridge (ADB)☆126Nov 30, 2014Updated 11 years ago
- ssl-cipher-suite enum is a Perl script to enumerate supported SSL cipher suites supported by network services (principally HTTPS)☆30Apr 5, 2021Updated 5 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- The dll that can hide itself and then delete itselft.☆32Mar 31, 2013Updated 13 years ago
- Configurable, flexible regex-based APK modification tool.☆37Jun 26, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- Scripts created by MRG Effitas☆42Nov 22, 2016Updated 9 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago