A console tool for inspecting Windows Ancillary Function Driver sockets
☆21May 15, 2025Updated 11 months ago
Alternatives and similar repositories for AfdSocketViewer
Users that are interested in AfdSocketViewer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Incident Response automation scripts☆16Sep 5, 2025Updated 7 months ago
- Understanding the operation and limitations of Sysmon's events☆23Sep 15, 2022Updated 3 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- Source code and examples for Antignis☆44Oct 21, 2022Updated 3 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆222Aug 12, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆13Mar 24, 2026Updated 3 weeks ago
- ☆18Oct 15, 2024Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 10 months ago
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆65Mar 27, 2026Updated 2 weeks ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- New exploitation tricks for hardened .NET Remoting servers☆32Aug 5, 2025Updated 8 months ago
- A cargo subcommand to build Rust with docker☆19Aug 24, 2017Updated 8 years ago
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆18Sep 25, 2022Updated 3 years ago
- Interprocess communication via a covert timing channel☆26Oct 24, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆18Jun 10, 2025Updated 10 months ago
- The Definitive Guide To Process Cloning on Windows☆543Jan 3, 2024Updated 2 years ago
- a mirror of masterMind fromr Uncle Bob( Robert C. Martin)☆23Apr 28, 2015Updated 10 years ago
- ☆39Mar 26, 2026Updated 2 weeks ago
- look or google 10000 english for (neo)vim☆27Jun 28, 2023Updated 2 years ago
- Manage and maintain Defender XDR custom collection configuration☆34Nov 19, 2025Updated 4 months ago
- ☆52May 4, 2025Updated 11 months ago
- Implementing AES 256 CBC in AES-NI - MASM Format☆20Aug 9, 2025Updated 8 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Mar 6, 2017Updated 9 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆36Feb 4, 2025Updated last year
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 7 months ago
- Ghidra data type archive for Windows driver analysis☆30Oct 10, 2024Updated last year
- ☆35Nov 16, 2023Updated 2 years ago
- A basic Secure Virtual Machine hypervisor☆27Feb 25, 2021Updated 5 years ago
- A checklist for defending private or corporate networks.☆17Jan 1, 2020Updated 6 years ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆74Apr 13, 2025Updated last year
- ☆41Updated this week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆22Feb 9, 2025Updated last year
- ☆28Aug 26, 2021Updated 4 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆29Jul 21, 2025Updated 8 months ago
- Lsass dumper evading (all ?) EDR detection☆51Nov 10, 2025Updated 5 months ago
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 3 years ago
- Target components for kAFL/Nyx Fuzzer☆33Jul 21, 2025Updated 8 months ago
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆24Mar 16, 2025Updated last year