Example of an over all attack using DLL_Wrapper.
☆11Aug 22, 2017Updated 8 years ago
Alternatives and similar repositories for DLL_Wrapper_Example
Users that are interested in DLL_Wrapper_Example are comparing it to the libraries listed below
Sorting:
- A program that generates code to implement a DLL Proxy.☆69Aug 22, 2017Updated 8 years ago
- Windows process injection methods☆18Jul 18, 2021Updated 4 years ago
- Reverse proxy for ultra-low latency streaming☆31May 30, 2024Updated last year
- ☆22Aug 11, 2021Updated 4 years ago
- TLS Examples in Schannel and IO Completion Ports☆10Jun 21, 2022Updated 3 years ago
- ☆10Mar 19, 2019Updated 6 years ago
- Windows日志清除工具☆10Apr 3, 2023Updated 2 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- A utility to calculate Hmac headers to connect to Modulr API☆10Nov 10, 2025Updated 3 months ago
- Alphabets is a learning tool that helps kids develop cognitive and psychomotor skills such as writing, drawing, and recognition of alphab…☆11May 6, 2017Updated 8 years ago
- Repository of constants used in TLS and X509 parsing☆13May 31, 2022Updated 3 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- ☆15Feb 18, 2022Updated 4 years ago
- Unbounded cache model for online language modeling with open vocabulary☆11Feb 15, 2019Updated 7 years ago
- ☆10May 28, 2020Updated 5 years ago
- Troopers Conference Supporting Materials☆12Apr 8, 2015Updated 10 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- Reed-Solomon Codec☆11Dec 21, 2018Updated 7 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago
- PyTorch code for Large-Scale Answerer in Questioner's Mind for Visual Dialog Question Generation (AQM+)☆10Feb 12, 2019Updated 7 years ago
- Proof of Concept Chatbot☆10Jan 13, 2023Updated 3 years ago
- ☆12Jan 20, 2025Updated last year
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- ☆10Aug 7, 2024Updated last year
- Our 5v5 matchmaking config☆13May 6, 2020Updated 5 years ago
- Borderlands2 hacker use UE3 SDK☆10Sep 18, 2019Updated 6 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- ☆10Jun 9, 2021Updated 4 years ago
- Windows binaries for mickael9's script that extracts contents from BitRock installers.☆12Apr 18, 2021Updated 4 years ago
- tcp socket封包,解包,粘包处理(包头+包体)☆10Sep 6, 2016Updated 9 years ago
- Zombie Bot from Darkweb☆11Jan 22, 2022Updated 4 years ago
- Urdu Word Segmentation using Conditional Random Fields (CRFs)☆12Oct 3, 2018Updated 7 years ago
- This Android Demo Example Shows the Hirji(Islamic) and Gregorian Calendar. Developer can Customize the Calendar by import the Calendar …☆10Nov 11, 2019Updated 6 years ago
- A toy OS for learning purposes.☆11Feb 29, 2024Updated last year
- Recursively extract urls from a web page for reconnaissance.☆12Jun 9, 2024Updated last year
- Rust Raspberry Pi examples☆13Sep 28, 2015Updated 10 years ago
- 7zip Static Build Dockerfile☆13Dec 23, 2024Updated last year