C# implementation to produce ROR-13 numeric hash for given function API name
☆34May 26, 2019Updated 6 years ago
Alternatives and similar repositories for ROR13HashGenerator
Users that are interested in ROR13HashGenerator are comparing it to the libraries listed below
Sorting:
- ☆11Jul 11, 2023Updated 2 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- ☆12Jan 10, 2025Updated last year
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- ☆14Mar 30, 2022Updated 3 years ago
- ☆17Jul 16, 2024Updated last year
- Repo that holds random POCs☆52Jan 8, 2024Updated 2 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Apr 19, 2023Updated 2 years ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- Clone running process with ZwCreateProcess☆59Nov 8, 2020Updated 5 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Mar 18, 2023Updated 2 years ago
- PoC of Spring AMQP Deserialization Vulnerability (CVE-2023-34050)☆13Jan 29, 2024Updated 2 years ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated last year
- ☆22Jan 15, 2025Updated last year
- ☆20Nov 1, 2022Updated 3 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 10 months ago
- A critical severity Remote Code Execution (RCE) vulnerability (CVE-2023-22527) was discovered in Confluence Server and Data Center.☆22Jan 23, 2024Updated 2 years ago
- Bypass UAC by abusing shell protocol handlers☆14Jul 12, 2021Updated 4 years ago
- 利用shiro反序列化注入冰蝎内存马☆37Dec 19, 2021Updated 4 years ago
- C# port of chm lib☆24Sep 7, 2011Updated 14 years ago
- 端口转发工具☆13May 13, 2016Updated 9 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- ☆55May 31, 2025Updated 9 months ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Oct 5, 2022Updated 3 years ago
- Delphi-Kawaii is a plugin for Ida Pro.☆22Jul 19, 2023Updated 2 years ago
- Unused DLL hollowing PoC in Nim☆17Jan 31, 2022Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆50Oct 22, 2019Updated 6 years ago
- ☆45Jul 12, 2018Updated 7 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 3 years ago
- ☆48May 12, 2021Updated 4 years ago