keklick1337 / PhantomGateLinks
Minimalistic port-spoofer written in Python
☆11Updated 9 months ago
Alternatives and similar repositories for PhantomGate
Users that are interested in PhantomGate are comparing it to the libraries listed below
Sorting:
- UAC Bypass using CMSTP in Rust☆32Updated 10 months ago
- ☆18Updated last year
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆40Updated 5 months ago
- Yandex browser password recovery☆11Updated 6 months ago
- A slightly more fun way to disable windows defender☆45Updated 5 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆20Updated 10 months ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 5 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆89Updated last month
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- A simple Jupyter Notebook to graph a users commit history over time, specifically looking at the author of the xz backdoor.☆21Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆83Updated last year
- ☆12Updated last year
- Keep it secret, keep it safe☆78Updated 8 months ago
- Build wordlists from the common-crawl index☆11Updated 3 years ago
- Attack tool for altering packed samples so that they evade static packing detection☆20Updated 8 months ago
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆25Updated last year
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Updated 11 months ago
- .NET tool used to enrich RPC telemetry☆99Updated 3 months ago
- ☆16Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Comprehensive Windows Syscall Extraction & Analysis Framework☆135Updated last month
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆18Updated 4 months ago
- ☆39Updated last year
- Dump Linux keyrings☆20Updated last year
- ☆33Updated 10 months ago
- API hooking and code injection made easy!☆39Updated 2 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 10 months ago