Detect and extract hidden files
☆22Aug 29, 2024Updated last year
Alternatives and similar repositories for ryoshi
Users that are interested in ryoshi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Native Powers Talk demos☆16Jan 30, 2026Updated last month
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- Simple C2 using GitHub repository as comms channel.☆32Oct 26, 2024Updated last year
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- ☆16Mar 13, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A TypeScript implementation of CVSS 2.0, 3.0, 3.1 and 4.0, alongside a web application for calculating scores for multiple CVSS vectors s…☆18Feb 27, 2026Updated last month
- Memory check for C/C++.☆12Sep 7, 2017Updated 8 years ago
- Spring内存马检测和隐形马研究☆14Nov 28, 2021Updated 4 years ago
- 使用kprobe获取sys_execve参数☆12Nov 22, 2018Updated 7 years ago
- Use kprobe capture common kernel event and can also use for hids agent(kernel module)☆10Nov 28, 2023Updated 2 years ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- A simple stateless packet filtering firewall built on top of eBPF/XDP☆11Nov 14, 2022Updated 3 years ago
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- ☆126Sep 1, 2024Updated last year
- Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505☆18Jun 8, 2017Updated 8 years ago
- ☆17Jun 16, 2025Updated 9 months ago
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- Use heroicons.com in your Rails projects.☆15Aug 23, 2021Updated 4 years ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆11Apr 22, 2022Updated 3 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 4 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Crystal Palace library for proxying Nt API calls via the Threadpool☆101Oct 18, 2025Updated 5 months ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- MS17-010 Exploits With Original NSA Tool(only for windows)☆32Jul 30, 2024Updated last year
- Get started with writing your first ever Windows Driver☆36Nov 4, 2023Updated 2 years ago
- A cheat sheet for the new post quantum cryptography algorithms☆24Jun 9, 2025Updated 9 months ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 3 months ago
- ☆10Jun 22, 2021Updated 4 years ago
- Squid SSL Proxy with SSL Bump for intercepting SSL traffic☆10Sep 10, 2025Updated 6 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Visual Studio .suo文件反序列化漏洞利用工具☆17Jun 28, 2025Updated 9 months ago
- ☆14Dec 26, 2024Updated last year
- ☆50Jun 4, 2025Updated 9 months ago
- 一本用代码写出来的Fuzzing书籍:The Fuzzing Book☆13Sep 30, 2023Updated 2 years ago
- 虚拟机带外内存监控☆14Mar 30, 2018Updated 7 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆12May 25, 2025Updated 10 months ago
- ☆10Aug 8, 2020Updated 5 years ago