AES-256 Microsoft Cryptography API Example Use.
☆35Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for AESCrypt
Users that are interested in AESCrypt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆51Feb 2, 2026Updated 2 months ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 2 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆139Feb 2, 2026Updated 2 months ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆182Feb 2, 2026Updated 2 months ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆23Jul 11, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆184Feb 2, 2026Updated 2 months ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆26Feb 2, 2026Updated 2 months ago
- Papers, presentations and documents from the team at Hacker House.☆53Feb 2, 2026Updated 2 months ago
- A collection of tools created for computer security research purposes.☆140Feb 2, 2026Updated 2 months ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated 2 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated 2 months ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆302Feb 2, 2026Updated 2 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Feb 2, 2026Updated 2 months ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆346Feb 2, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with al…☆95Feb 2, 2026Updated 2 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆322Feb 2, 2026Updated 2 months ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- ☆35Dec 21, 2023Updated 2 years ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆468Feb 22, 2026Updated 2 months ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆143Feb 2, 2026Updated 2 months ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- ☆10Dec 28, 2023Updated 2 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆43Oct 19, 2023Updated 2 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆47Jan 10, 2024Updated 2 years ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆42Apr 25, 2024Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- a windows kernel keylogger that works☆20Feb 12, 2024Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆83Jan 8, 2024Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆63Feb 2, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆83Feb 2, 2026Updated 2 months ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated 2 years ago
- ☆17Jan 7, 2022Updated 4 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- ☆13Feb 21, 2021Updated 5 years ago