josh0xA / K55View external linksLinks
Linux x86_64 Process Injection Utility
☆58Mar 9, 2021Updated 4 years ago
Alternatives and similar repositories for K55
Users that are interested in K55 are comparing it to the libraries listed below
Sorting:
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆136Jan 13, 2026Updated last month
- Apply a filter to the events being reported by windows event logging☆264Apr 24, 2021Updated 4 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- proxy your C2 traffic through CDN using websocket☆52Jul 24, 2022Updated 3 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Oct 10, 2020Updated 5 years ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated last year
- ☆51Sep 18, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Userland API Unhooker Project☆110Jun 14, 2021Updated 4 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆156Jun 30, 2020Updated 5 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆115Feb 27, 2021Updated 4 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆102Mar 3, 2021Updated 4 years ago
- ☆73Jul 29, 2021Updated 4 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 4 years ago
- Best Graphical Hacking Platform Online☆37Apr 4, 2020Updated 5 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- ☆28Oct 4, 2021Updated 4 years ago
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- A Simple Linux ELF Runtime Crypter☆270Feb 25, 2025Updated 11 months ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Aug 8, 2024Updated last year
- DLL Unhooking☆13Mar 26, 2021Updated 4 years ago
- Repo to store Windows PE's and Utilities for easy access.☆16May 11, 2021Updated 4 years ago
- helper encrypt data