Detect and extract hidden files
☆22Aug 29, 2024Updated last year
Alternatives and similar repositories for ryoshi
Users that are interested in ryoshi are comparing it to the libraries listed below
Sorting:
- Native Powers Talk demos☆15Jan 30, 2026Updated last month
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- My sexy website☆20Feb 13, 2017Updated 9 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- ☆25Apr 28, 2024Updated last year
- PuPu is a lightweight, cross-platform desktop AI client that works with both local and cloud-hosted models. Whether you prefer running mo…☆22Updated this week
- ☆38Apr 15, 2025Updated 10 months ago
- Simple C2 using GitHub repository as comms channel.☆32Oct 26, 2024Updated last year
- MS17-010 Exploits With Original NSA Tool(only for windows)☆31Jul 30, 2024Updated last year
- ☆126Sep 1, 2024Updated last year
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- ☆35Feb 3, 2025Updated last year
- ☆10Aug 26, 2025Updated 6 months ago
- Go wrapper for in-memory DLL module loader, MemoryModule☆32Feb 13, 2018Updated 8 years ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- ☆50Jun 4, 2025Updated 9 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- Get started with writing your first ever Windows Driver☆35Nov 4, 2023Updated 2 years ago
- Userland exec PoC to be used as attack vector technique☆96Oct 23, 2025Updated 4 months ago
- fast, zero config web endpoint change monitor☆43Aug 4, 2020Updated 5 years ago
- Convert source code to LLM ready knowledge base☆29Dec 30, 2025Updated 2 months ago
- Direct access to NTFS volumes☆291Sep 9, 2025Updated 5 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆40Oct 26, 2022Updated 3 years ago
- Real-time IoT monitoring and control for Xiaomi electric scooters using Raspberry Pi, GPS, and 4G, with Grafana data visualization. Open…☆14Oct 4, 2024Updated last year
- ☆16Nov 11, 2022Updated 3 years ago
- Deploy a containerized Node.js app on ECS Fargate with an ALB using AWS CDK. Showcases ECS code-mounting for hot-reloading and remote deb…☆14Aug 11, 2025Updated 6 months ago
- A Chrome extension hosts an Ollama UI web server on localhost and other servers, helping you manage models and chat with any open-source …☆13Sep 4, 2025Updated 6 months ago
- Knowledge Content for OCI Observability and Management Services☆17Updated this week
- ANT+ remote button☆11Jul 20, 2021Updated 4 years ago
- A python library / model for creating co-references between AMR graph nodes.☆11Dec 11, 2022Updated 3 years ago
- ☆15Updated this week
- Repository for Gephi Plugins maintained by the team. Each plugin has it's branch.☆12Nov 14, 2023Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Crystal Palace library for proxying Nt API calls via the Threadpool☆100Oct 18, 2025Updated 4 months ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago