DLL hijacking vulnerability scanner and PE infector tool
☆20Sep 8, 2017Updated 8 years ago
Alternatives and similar repositories for Siofra
Users that are interested in Siofra are comparing it to the libraries listed below
Sorting:
- ☆24Sep 26, 2021Updated 4 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- VBScript minifier☆25Jan 9, 2026Updated last month
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- C# program to take a full size screenshot or a recording of the user's desktop. Takes in 0-3 flags☆84Oct 2, 2020Updated 5 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆76Mar 13, 2025Updated 11 months ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- ☆16May 15, 2021Updated 4 years ago
- A Chrome cookie dumping utility☆46Feb 21, 2020Updated 6 years ago
- Bare template for a Kernel Mode Driver☆51Mar 10, 2020Updated 5 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Nov 23, 2019Updated 6 years ago
- D/Invoke port of UrbanBishop☆108Jul 19, 2020Updated 5 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆142May 23, 2020Updated 5 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- ☆23Mar 6, 2023Updated 2 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- A git history of Windows filesystems☆77Aug 21, 2020Updated 5 years ago
- ☆60Dec 20, 2023Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- ☆37Dec 27, 2021Updated 4 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago