DLL Injector as a service that watches the health of the started thread.
☆10Feb 3, 2020Updated 6 years ago
Alternatives and similar repositories for Watchdog
Users that are interested in Watchdog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 3 months ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 4 years ago
- Windows Malware monitors and infects specific kinds of files.☆18Sep 24, 2019Updated 6 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 视频播放(编辑)引擎☆10Jul 16, 2022Updated 3 years ago
- ☆11Apr 10, 2021Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- Ark Cluster Companion Container☆12Aug 24, 2025Updated 7 months ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- In line function hooking LKM rootkit☆52Mar 5, 2020Updated 6 years ago
- An utility tool to run application release-checklist safely☆14Apr 26, 2020Updated 5 years ago
- Repo to archive the 2019 RITSEC CTF Challenges & Documentation☆33Aug 26, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆27Nov 23, 2025Updated 4 months ago
- The watchdog monitors the operation of the system by expecting periodic communication from the software, generally known as servicing or …☆25Sep 16, 2021Updated 4 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- Linux rust keylogger☆17Mar 1, 2024Updated 2 years ago
- Rite Of Passage ROP Injector☆35Aug 4, 2019Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- My little birds are everywhere. Even in the North. They whisper to me, the strangest stories☆23May 22, 2023Updated 2 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.