holly-hacker / KeePassHax
A tool to extract a KeePass master password from memory
☆77Updated 3 years ago
Related projects: ⓘ
- A specialized C# memory-accessing library☆42Updated 5 years ago
- Runs programs as TrustedInstaller☆43Updated 5 years ago
- ☆59Updated this week
- ☆19Updated this week
- CTF writeups☆32Updated last year
- .NET Assemblies Deobfuscator.☆63Updated 2 years ago
- ☆34Updated this week
- Plugin for DnSpy - Analyze through assemblies and display their strings.☆54Updated 5 years ago
- .net debugger / msil interpreter / emulator☆16Updated 5 years ago
- JITM is an automated tool to bypass the JIT Hooking protection on a .NET sample.☆49Updated 3 years ago
- My small extension to add anti-anti-debbuging support to dnSpy☆38Updated 6 years ago
- Encrypts and loads encrypted DLLs☆56Updated 5 years ago
- Devirtualizer for Eazfuscator.NET☆29Updated 7 years ago
- Babel-Deobfuscator is an open-source deobfuscator for Babel Obfuscator.☆35Updated 4 years ago
- Dump certificates from PE files in different formats☆36Updated 8 months ago
- Transforms a .NET binary into a chain of meaningless-looking await expressions.☆60Updated 3 months ago
- Virtualization done for .NET made as a plugin for ConfuserEX.☆29Updated 6 years ago
- Framework for C# development☆66Updated this week
- Windows Data Protection API (DPAPI) command line tool☆22Updated 5 years ago
- Deobfuscator for ConfuserEx☆67Updated 7 years ago
- UAC Bypass for windows☆37Updated 4 years ago
- A manual system call library that supports functions from both ntdll.dll and win32u.dll☆107Updated last year
- .NET executable packer☆55Updated 5 years ago
- Windows Process Injection Toolkit - plain and simple :)☆26Updated 6 years ago
- A simple POC to demonstrate the power of .NET debugging for injection☆71Updated 4 years ago
- a dynamic Agile.NET string decryptor that relies on invoke by wwh1004 | Version : 6.X☆39Updated 3 years ago
- A small virtualizer for .NET which works together with ConfuserEx☆62Updated 5 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated 3 months ago
- Contacts for VirusTotal scanners☆28Updated 9 months ago
- Control flow deobfuscation using Z3 and ILAst☆41Updated 7 years ago