Dll injection for executable file
☆17Jul 22, 2016Updated 9 years ago
Alternatives and similar repositories for DllInjectExec
Users that are interested in DllInjectExec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scanner for document roots/URLs.☆14Nov 17, 2011Updated 14 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Sep 26, 2019Updated 6 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Bro script module for detecting malware using domain generation algorithms.☆13Feb 22, 2018Updated 8 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Framework for static and dynamic analysis in Android APKs☆33Jul 25, 2017Updated 8 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 9 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- A set of tools and procedures for automating NSM and NIDS deployments in AWS☆15Oct 16, 2020Updated 5 years ago
- Exemple d'extension Burp permettant d'utiliser les fichiers de configuration de proxy PAC☆11Feb 28, 2016Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The two official starters merged together. That's it.☆13Mar 17, 2017Updated 9 years ago
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆21Aug 6, 2017Updated 8 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 5 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Pure Rust fuzzy hash implementation☆22Mar 13, 2023Updated 3 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🗑 Simple program to uninstall some of the Windows 10 apps, that you cannot remove easily.☆10Jan 11, 2020Updated 6 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- ☆12Jul 27, 2017Updated 8 years ago
- Django auth implementation for SQRL (https://www.grc.com/sqrl/sqrl.htm)☆13Oct 16, 2022Updated 3 years ago
- Perl implementation of IEC 60870-5-104 standard (server and client)☆19May 17, 2011Updated 14 years ago
- The Microsoft Build Engine (MSBuild) is the build platform for .NET and Visual Studio.☆14Mar 13, 2026Updated last month
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago
- PowerShell HTTP(s) Intercepting Proxy☆14Sep 30, 2014Updated 11 years ago
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆18Oct 29, 2014Updated 11 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 7 months ago
- A managed Electron wrapper for Ionic Apps☆25Apr 2, 2017Updated 9 years ago
- ☆22Jun 9, 2025Updated 10 months ago
- ☆13Jan 6, 2020Updated 6 years ago
- My blog☆11Nov 17, 2020Updated 5 years ago
- Server prepared for SSRF post exploitation, javascript exploits and open redirect.☆13Jan 4, 2023Updated 3 years ago
- Dump internal ROM from Cypress (Fujitsu) F2MC-8L microcontrollers☆16Oct 13, 2023Updated 2 years ago