☆19Aug 6, 2021Updated 4 years ago
Alternatives and similar repositories for Introduction-to-Process-Hollowing
Users that are interested in Introduction-to-Process-Hollowing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jul 1, 2023Updated 2 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Red Team Operation's Defense Evasion Technique.☆56Jun 4, 2024Updated last year
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- Utilities for use with IP. It has functions for IPv4, IPv6 and CIDR.☆15May 31, 2024Updated last year
- function identification signatures☆12Apr 26, 2021Updated 5 years ago
- Ida Pro plugin to aid in reverse engineering Rust binaries.☆19Dec 9, 2024Updated last year
- An IDA plugin to deobfuscate Pikabot's strings using RC4 and AES☆13Apr 8, 2024Updated 2 years ago
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated 2 years ago
- Unused DLL hollowing PoC in Nim☆17Jan 31, 2022Updated 4 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- ☆15Sep 30, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 5 months ago
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 4 years ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Mar 24, 2022Updated 4 years ago
- Custom Splunk search command to reconstruct a pstree from Sysmon process creation events (EventCode 1)☆24Mar 30, 2026Updated last month
- A python script that can detect and parse loki-bot (malware) related network traffic. This script can be helpful to DFIR analysts and sec…☆13Dec 31, 2021Updated 4 years ago
- IDA plugin for automatic deobfuscation of opaque predicates by lifting microcode to z3 for SMT reasoning.☆60Apr 30, 2026Updated 3 weeks ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Apr 10, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆108Mar 8, 2023Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆53Sep 21, 2023Updated 2 years ago
- Fork of Synacktiv's private Lumina server☆20Feb 22, 2022Updated 4 years ago
- A tiny macro library for protecting sensitive strings in compiled binaries☆40Oct 8, 2024Updated last year
- ☆44Oct 16, 2025Updated 7 months ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ClickHouse是一款开源的列式数据库,ClickHouse存在未授权访问漏洞,攻击者可利用该漏洞获取数据库的敏感信息☆14May 6, 2023Updated 3 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated 2 years ago
- Ergonomic GMP Integers for Nim☆10Sep 1, 2023Updated 2 years ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆30Dec 4, 2020Updated 5 years ago
- Emulation Wrapper Solution is a IDA Pro plugin that brings emulator capacities to provide features such as debugging an mocking.☆23May 25, 2023Updated 2 years ago
- GraphViz dot files into Figma☆14Oct 24, 2025Updated 6 months ago
- Nim implementation of Simple Serialize (SSZ) serialization and merkleization☆10May 7, 2026Updated 2 weeks ago