This work-in-progress outlines known vulnerabilities in the Electron framework, and how they may be abused to create dangerous exploits.
☆98Jun 25, 2024Updated last year
Alternatives and similar repositories for How-To-Tamper-With-Any-Electron-Application
Users that are interested in How-To-Tamper-With-Any-Electron-Application are comparing it to the libraries listed below
Sorting:
- RegFineViewer is an utility to visualize and navigate easily the Windows Registry☆18Jan 20, 2021Updated 5 years ago
- A sample dll that can be injected into Google Chrome written for my bachelors thesis.☆10Jan 13, 2016Updated 10 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Open source release of the dirtyJOE - editor for the compiled java .class files.☆32Jan 7, 2023Updated 3 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- A simple and stable proxy DLL for Windows x64☆16May 31, 2021Updated 4 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Updated Android biometric bypass script for Frida (from Kamil Breński, Krzysztof Pranczk and Mateusz Fruba, August 2019). The code resolv…☆43Jan 31, 2023Updated 3 years ago
- Convert iOS Address book directly to vCard file☆17Feb 8, 2018Updated 8 years ago
- A lightweight and fast proxy utility tries to include any useful features.☆13Dec 2, 2023Updated 2 years ago
- plugin for storing and using snippets of useful Binja script☆29Jan 11, 2026Updated 2 months ago
- My CTF write-ups!☆26Dec 22, 2022Updated 3 years ago
- JObfuscator is a source code obfuscator for the Java language. Protect Java source code & algorithms from hacking, cracking, reverse engi…☆11Mar 11, 2023Updated 3 years ago
- GTK+3 customizable file manager with advanced unique features☆21Dec 13, 2014Updated 11 years ago
- random ctf bits☆10Nov 18, 2024Updated last year
- A full-stack open-source autonomous drone delivery system.☆23Mar 27, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- Video encryption while maintaining playability.☆11Jan 13, 2023Updated 3 years ago
- A debugger for Java applications☆13Dec 24, 2018Updated 7 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- My agents for lunar-client, best used with lunar-client-qt.☆12May 18, 2022Updated 3 years ago
- Compact SMTP to HTTP Gateway (targeting Slack for QNAP-NAS notifications)☆13Jul 10, 2020Updated 5 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Slides and materials for the talk Reconstructing Rust Types: A Practical Guide for Reverse Engineers at RE//verse 2025, presented on Febr…☆24May 23, 2025Updated 9 months ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Mar 19, 2018Updated 8 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- StringEncrypt allows you to encrypt strings and files using a randomly generated algorithm, generating a unique decryption code (so-calle…☆23Mar 11, 2023Updated 3 years ago
- Evernote to Org mode migration tool☆23Feb 5, 2019Updated 7 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- Extract data of TTD trace file to a minidump☆30Jul 31, 2023Updated 2 years ago
- Add frida-gadgets into APK for non rooted devices.☆84Mar 10, 2025Updated last year
- ☆12Mar 26, 2021Updated 4 years ago
- A tool used to automatically update Portainer software☆16Mar 12, 2026Updated last week
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- BlueStacks privilege escalation through VM backdooring☆21Jul 16, 2024Updated last year
- This repository is dedicated to hosting personal comprehensive walkthrough solutions for Splunk's Boss of the SOC (BOTS) CTF-style labs. …☆15Dec 30, 2023Updated 2 years ago
- Advanced Night Mode☆22Feb 27, 2021Updated 5 years ago