A console tool for inspecting Windows Ancillary Function Driver sockets
☆21May 15, 2025Updated 10 months ago
Alternatives and similar repositories for AfdSocketViewer
Users that are interested in AfdSocketViewer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Incident Response automation scripts☆16Sep 5, 2025Updated 6 months ago
- Understanding the operation and limitations of Sysmon's events☆23Sep 15, 2022Updated 3 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- Source code and examples for Antignis☆44Oct 21, 2022Updated 3 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆222Aug 12, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Mar 3, 2025Updated last year
- ☆18Oct 15, 2024Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 9 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- New exploitation tricks for hardened .NET Remoting servers☆32Aug 5, 2025Updated 7 months ago
- A cargo subcommand to build Rust with docker☆19Aug 24, 2017Updated 8 years ago
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆17Sep 25, 2022Updated 3 years ago
- Interprocess communication via a covert timing channel☆26Oct 24, 2025Updated 5 months ago
- ☆18Jun 10, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Definitive Guide To Process Cloning on Windows☆543Jan 3, 2024Updated 2 years ago
- Implementing AES 256 CBC in AES-NI - MASM Format☆19Aug 9, 2025Updated 7 months ago
- a mirror of masterMind fromr Uncle Bob( Robert C. Martin)☆23Apr 28, 2015Updated 10 years ago
- ☆39Mar 2, 2026Updated 3 weeks ago
- look or google 10000 english for (neo)vim☆27Jun 28, 2023Updated 2 years ago
- Manage and maintain Defender XDR custom collection configuration☆34Nov 19, 2025Updated 4 months ago
- ☆52May 4, 2025Updated 10 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 6 months ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Mar 6, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆36Feb 4, 2025Updated last year
- Visualize Microsoft Defender XDR process trees and security events☆32Aug 24, 2025Updated 7 months ago
- Ghidra data type archive for Windows driver analysis☆30Oct 10, 2024Updated last year
- ☆35Nov 16, 2023Updated 2 years ago
- A basic Secure Virtual Machine hypervisor☆27Feb 25, 2021Updated 5 years ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 11 months ago
- A checklist for defending private or corporate networks.☆17Jan 1, 2020Updated 6 years ago
- ☆39Updated this week
- ☆22Feb 9, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆28Aug 26, 2021Updated 4 years ago
- Lsass dumper evading (all ?) EDR detection☆49Nov 10, 2025Updated 4 months ago
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 2 years ago
- Target components for kAFL/Nyx Fuzzer☆34Jul 21, 2025Updated 8 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- ☆137Mar 13, 2026Updated last week
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆24Mar 16, 2025Updated last year