Mockingjay Process Injection Vulnerable DLL Finder
☆19Jun 30, 2023Updated 2 years ago
Alternatives and similar repositories for Mockingjay---Vulnerable-DLL-Finder
Users that are interested in Mockingjay---Vulnerable-DLL-Finder are comparing it to the libraries listed below
Sorting:
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- Inject shellcode into a valid BMP/GIF image.☆34Sep 7, 2020Updated 5 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 4 months ago
- ☆30Aug 24, 2025Updated 6 months ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 4 years ago
- Collection of scripts and CMake files to easily link to LLVM into your project (Windows, Linux, macOS).☆43Apr 2, 2025Updated 11 months ago
- ☆17Mar 6, 2023Updated 2 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆38May 12, 2022Updated 3 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- Cheat Engine-like but MCP☆30Apr 15, 2025Updated 10 months ago
- ☆18Oct 8, 2024Updated last year
- Example of making debugger using Hardware Breakpoint + VEH☆18May 13, 2021Updated 4 years ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated 11 months ago
- ☆19Jul 9, 2022Updated 3 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆21Sep 28, 2024Updated last year
- Process Injection without R/W target memory and without creating a remote thread☆19Feb 14, 2022Updated 4 years ago
- A Mythic Agent written in PIC C.☆207Feb 4, 2025Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆138May 22, 2025Updated 9 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Mar 2, 2022Updated 4 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- ☆59Dec 9, 2024Updated last year
- API Hammering with C++20☆50Jul 21, 2022Updated 3 years ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated 11 months ago
- ULPatch is open source user space live patch tool.☆13Jan 11, 2026Updated last month
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆19Nov 13, 2025Updated 3 months ago
- plonky2 proving over paladin☆22Jun 19, 2024Updated last year
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- Minimal header-only C++11 argument parser library for simple command line tools.☆25Feb 2, 2025Updated last year
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago