Linux x86_64 Process Injection Utility
☆59Mar 9, 2021Updated 5 years ago
Alternatives and similar repositories for K55
Users that are interested in K55 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Apply a filter to the events being reported by windows event logging☆264Apr 24, 2021Updated 4 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆136Jan 13, 2026Updated 2 months ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- proxy your C2 traffic through CDN using websocket☆52Jul 24, 2022Updated 3 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Aug 8, 2024Updated last year
- ☆51Sep 18, 2020Updated 5 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Oct 10, 2020Updated 5 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆156Jun 30, 2020Updated 5 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆218Feb 20, 2023Updated 3 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆56Nov 24, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆78May 24, 2018Updated 7 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆132Nov 7, 2024Updated last year
- Yet another content discovery tool☆119Nov 16, 2024Updated last year
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆247Aug 14, 2024Updated last year
- ☆28Oct 4, 2021Updated 4 years ago
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 5 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆220May 3, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆102Mar 3, 2021Updated 5 years ago
- ☆73Jul 29, 2021Updated 4 years ago
- ☆65Jul 3, 2024Updated last year
- A collection of weaponized LPE exploits written in Go☆53Jan 23, 2025Updated last year
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 5 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago