kuciapakrystian / filmoteka-team-no-5-GoITView external linksLinks
Filmoteka is a team project that finalizes JS course in GoIT academy
☆16Mar 18, 2024Updated last year
Alternatives and similar repositories for filmoteka-team-no-5-GoIT
Users that are interested in filmoteka-team-no-5-GoIT are comparing it to the libraries listed below
Sorting:
- iOS逆向:Swift逆向☆14Dec 21, 2025Updated last month
- ☆13Jul 24, 2017Updated 8 years ago
- Official Dexcalibur documentation☆17May 27, 2021Updated 4 years ago
- ☆21May 13, 2025Updated 9 months ago
- My talks and papers☆40Nov 24, 2025Updated 2 months ago
- ✨个性化你的 Github Contribution Gragh☆43Jun 7, 2025Updated 8 months ago
- ☆39Nov 1, 2021Updated 4 years ago
- Programming course for Wannabes☆56Jan 26, 2025Updated last year
- From series Daily LeetCode Challenge☆64Jul 16, 2023Updated 2 years ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆94Feb 9, 2026Updated last week
- A Deep Learning framework that analyses Windows PE files to detect malicious Softwares.☆76Sep 12, 2025Updated 5 months ago
- apkInspector is a tool designed to provide detailed insights into the zip structure of APK files, offering the capability to extract cont…☆87Oct 27, 2025Updated 3 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆111Dec 28, 2022Updated 3 years ago
- Repository for download all version of @hpAndro1337 (Android AppSec) application.☆102Dec 26, 2023Updated 2 years ago
- windows pe packing☆117Jan 17, 2023Updated 3 years ago
- 《APK安全测试与安全研究》☆128Feb 26, 2024Updated last year
- IDA Plugin that fills in missing indirect CALL & JMP target information☆141Jan 12, 2025Updated last year
- Another meterpreter injection technique using C# that attempts to bypass Defender☆265Oct 20, 2021Updated 4 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆142Aug 2, 2021Updated 4 years ago
- Source code of exploiting windows API for red teaming series☆150Sep 25, 2022Updated 3 years ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆368Aug 29, 2025Updated 5 months ago
- Sample scripts and extensions for JEB Decompiler.☆223Feb 7, 2026Updated last week
- A PoC ransomware sample to test out your ransomware response strategy.☆211Feb 10, 2026Updated last week
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆265Dec 6, 2025Updated 2 months ago
- C# based evtx parser with lots of extras☆340Sep 4, 2025Updated 5 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆358Dec 13, 2025Updated 2 months ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆373Mar 24, 2025Updated 10 months ago
- ☆381Updated this week
- PounceKey's is a Accessibility Service keylogger for Android 5 to 15! full launcher stealth. choose between receiving logs via IP, Gmail,…☆381Dec 24, 2025Updated last month
- BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).☆557Updated this week
- Go shellcode loader that combines multiple evasion techniques☆387Jun 21, 2023Updated 2 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆412May 8, 2023Updated 2 years ago
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆486Apr 17, 2025Updated 10 months ago
- dll injection tool that implements various methods☆501Jan 7, 2013Updated 13 years ago
- Notes from the Certified Kubernetes Security Specialist Course on KodeKloud☆596May 28, 2025Updated 8 months ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆638Aug 30, 2022Updated 3 years ago
- Writeups for various CTFs☆674Dec 23, 2025Updated last month
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆747May 23, 2025Updated 8 months ago