Dll injection for executable file
☆17Jul 22, 2016Updated 9 years ago
Alternatives and similar repositories for DllInjectExec
Users that are interested in DllInjectExec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scanner for document roots/URLs.☆14Nov 17, 2011Updated 14 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Simple golang reverse shell☆20Jan 22, 2020Updated 6 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Sep 26, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- Bro script module for detecting malware using domain generation algorithms.☆13Feb 22, 2018Updated 8 years ago
- ☆14Feb 12, 2026Updated last month
- Framework for static and dynamic analysis in Android APKs☆32Jul 25, 2017Updated 8 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 9 years ago
- A logging library for eBPF programs.☆25Jul 28, 2022Updated 3 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Pure Rust fuzzy hash implementation☆22Mar 13, 2023Updated 3 years ago
- Change the GDM background of Ubuntu and Pop_OS! 22.04 Jammy☆14Jun 20, 2023Updated 2 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- ☆12Jul 27, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Detect Phishing with Bro IDS☆18Feb 1, 2017Updated 9 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 11 years ago
- A copy trading tool for Binance☆10Nov 2, 2020Updated 5 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- The Microsoft Build Engine (MSBuild) is the build platform for .NET and Visual Studio.☆14Mar 13, 2026Updated 3 weeks ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago
- PowerShell HTTP(s) Intercepting Proxy☆14Sep 30, 2014Updated 11 years ago
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆18Oct 29, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Python interface to the CRITs API☆22Mar 10, 2017Updated 9 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 6 months ago
- ☆22Jun 9, 2025Updated 10 months ago
- ☆13Jan 6, 2020Updated 6 years ago
- Server prepared for SSRF post exploitation, javascript exploits and open redirect.☆13Jan 4, 2023Updated 3 years ago
- My blog☆11Nov 17, 2020Updated 5 years ago
- Personal lists containing additional filters to adblock domains.☆14Jan 25, 2021Updated 5 years ago