enigma0x3 / windows-operating-system-archaeologyView external linksLinks
windows-operating-system-archaeology @Enigma0x3 @subTee
☆23Apr 22, 2017Updated 8 years ago
Alternatives and similar repositories for windows-operating-system-archaeology
Users that are interested in windows-operating-system-archaeology are comparing it to the libraries listed below
Sorting:
- ☆10May 27, 2021Updated 4 years ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated last year
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- ☆11Nov 12, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 2 years ago
- This project has been moved from a private repository.☆11May 4, 2018Updated 7 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- ☆17May 7, 2025Updated 9 months ago
- ☆19Nov 28, 2024Updated last year
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆17Sep 14, 2017Updated 8 years ago
- This version touches disk for registry persistence.☆26Oct 6, 2015Updated 10 years ago
- TypeLib persistence technique☆139Oct 22, 2024Updated last year
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 5 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆65Dec 16, 2023Updated 2 years ago
- ☆33Jan 23, 2025Updated last year
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆67Oct 9, 2022Updated 3 years ago
- ☆51Feb 5, 2014Updated 12 years ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated 11 months ago
- Copy xRAT repository☆23May 15, 2018Updated 7 years ago
- map driver to memory☆26Aug 26, 2018Updated 7 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 3 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Evasive loader to bypass static detection☆59Jan 15, 2024Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- Windows Crypter/Decrypter Generator with AES 256 bits key☆31Dec 17, 2018Updated 7 years ago
- This project has been moved from a private repository☆26Jun 4, 2018Updated 7 years ago
- Mass target enumeration☆32Apr 3, 2021Updated 4 years ago
- Custom pentesting tools☆26Nov 17, 2020Updated 5 years ago
- Your Skyfall Infrastructure Pack☆89Jan 25, 2026Updated 3 weeks ago