g3rzi / DropNetView external linksLinks
A tool that can be used to close network connections automatically with a given parameters
☆14Apr 19, 2023Updated 2 years ago
Alternatives and similar repositories for DropNet
Users that are interested in DropNet are comparing it to the libraries listed below
Sorting:
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- ☆24May 28, 2021Updated 4 years ago
- [DEPRECATED] Elastic Beats Input plugin for Graylog☆18Mar 15, 2019Updated 6 years ago
- Rethinking the User Interface of AI☆28Updated this week
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 2 years ago
- From Zero to Hero in Web Security Research - Def Con 29 Workshop☆37Jul 23, 2024Updated last year
- Application to track your time spent on different projects each day.☆10Dec 27, 2025Updated last month
- ☆13Nov 5, 2024Updated last year
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Sep 19, 2017Updated 8 years ago
- ☆48Feb 1, 2026Updated last week
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- ☆16May 13, 2021Updated 4 years ago
- Standalone support for QCOM's Iris FM☆11Dec 25, 2016Updated 9 years ago
- Lists of Dynamic DNS Domains/FQDNs as well as lists of services/providers that offer free dynamic dns domains.☆12Nov 2, 2021Updated 4 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- Valkyrie Chronicles PC game file editing tool via CSV.☆13Aug 12, 2018Updated 7 years ago
- SilkETW & SilkService☆40Aug 14, 2019Updated 6 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆45Mar 9, 2022Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- ☆11May 2, 2022Updated 3 years ago
- Some anti-sandbox codes, copy directly to strengthen your own ShellCode☆12Dec 26, 2022Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Extract your KeePass plugins' source code☆11May 25, 2017Updated 8 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Makes drivers less sucky to manage from usermode.☆11Aug 5, 2016Updated 9 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆13Jun 28, 2025Updated 7 months ago
- Modified Beam Search with periodical restart☆12Sep 12, 2024Updated last year
- Analyze Zeek IDS data with ksqlDB running on Confluent Platform via Docker on your laptop. Or spin up an arbitrary number of AWS hosts, …☆11Sep 30, 2021Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- BookWorm: A Dataset for Character Description and Analysis [EMNLP Findings 2024]☆14Feb 28, 2025Updated 11 months ago
- Go(od) Job is a simple job scheduler that supports task retries, logging, and task sharding.☆12Sep 10, 2024Updated last year