.NET wrapper for libnfc project
☆15Feb 23, 2021Updated 5 years ago
Alternatives and similar repositories for sharp-nfc
Users that are interested in sharp-nfc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- non-linear video editor, better than sony vegas and adobe crap☆10Aug 21, 2015Updated 10 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- TokenGet is a tool to intercept Samsung Pay tokens using a credit card reader and a raspberry zero.☆25Aug 15, 2016Updated 9 years ago
- Swordsmanship Master Fighting game in Unity3D. Battle Scheme is learnt from Mount&Blade and 流星蝴蝶剑.☆25Mar 24, 2016Updated 10 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆11Mar 19, 2019Updated 7 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- Crisis Anti-Debug and Anti-Debugger Protection for C# Applications☆46Sep 8, 2021Updated 4 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- Real Estate extension for EspoCRM☆24Mar 27, 2026Updated 2 weeks ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- COM runtime support for SharpGen generated interop code.☆13Sep 9, 2021Updated 4 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- C# library for calling executable files☆10Dec 3, 2018Updated 7 years ago
- A Powershell script for signing or adding signatures to tap-windows6 drivers☆10Apr 18, 2019Updated 6 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- A collection of useful aggressor scripts. All credits due to its authors.☆12Jul 5, 2019Updated 6 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- Generic methods for retrying functions and actions in .NET☆10Oct 28, 2019Updated 6 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A C# DLL Wrapper Generator☆11Feb 23, 2022Updated 4 years ago
- New and modified (ConfuserEx) protections☆62Sep 9, 2019Updated 6 years ago
- c#调用ffmpeg☆26Sep 6, 2016Updated 9 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 6 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 7 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- PE Infector/Cryptor source code☆16Apr 30, 2017Updated 8 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆11Jan 5, 2024Updated 2 years ago
- ☆16Dec 31, 2016Updated 9 years ago
- A simple library for reading PE (Portable Executable) headers.☆14Sep 4, 2023Updated 2 years ago