keklick1337 / PhantomGateLinks
Minimalistic port-spoofer written in Python
☆11Updated last year
Alternatives and similar repositories for PhantomGate
Users that are interested in PhantomGate are comparing it to the libraries listed below
Sorting:
- A simple Jupyter Notebook to graph a users commit history over time, specifically looking at the author of the xz backdoor.☆23Updated last year
- UAC Bypass using CMSTP in Rust☆34Updated last year
- Comprehensive Windows Syscall Extraction & Analysis Framework☆161Updated 5 months ago
- Static binary analysis with Detect It Easy — 100% in your browser, no uploads.☆53Updated this week
- A slightly more fun way to disable windows defender☆52Updated 9 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆85Updated last year
- Yandex browser password recovery☆11Updated 10 months ago
- Microsoft Developer Blogs Search Tool☆25Updated 9 months ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20Updated 8 months ago
- NoMoreStealers is a Windows file system minifilter driver that protects sensitive user data from untrusted processes.☆93Updated 3 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Updated last year
- In-Memory Rootkit For Linux and BSD☆87Updated 6 months ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆22Updated last year
- ☆18Updated last year
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Updated 9 months ago
- ☆35Updated 3 weeks ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 9 months ago
- A YARA rule generator☆61Updated this week
- ☆115Updated last week
- ☆18Updated last week
- API hooking and code injection made easy!☆40Updated 2 years ago
- A dynamic unpacking tool☆145Updated 2 years ago
- Awesome list of Living off the Land (LOL) methods, tools, and features commonly abused by attackers☆34Updated 10 months ago
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆26Updated last year
- quASAR: ASAR manipulation made easy☆38Updated 3 years ago
- A Windows Named Pipe Multi-tool / Proxy☆287Updated 2 months ago
- Convert .reg to registry hive and reciprocally, without elevation☆79Updated 9 months ago
- Advanced dynamic malware analysis tool.☆82Updated 2 years ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago