☆44Jun 22, 2021Updated 4 years ago
Alternatives and similar repositories for kimagure
Users that are interested in kimagure are comparing it to the libraries listed below
Sorting:
- 'Assemblers And Loaders' book exercises☆10Dec 14, 2021Updated 4 years ago
- Group 4 - C# Remote Administrator Tool☆11Feb 18, 2025Updated last year
- Heap Exploitation Resources☆23Jun 5, 2023Updated 2 years ago
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- Hello World examples in assembly, for use as templates.☆12Jan 18, 2026Updated 2 months ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆322Sep 23, 2022Updated 3 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- A PowerShell script to automatically configure for the highest privacy and control settings in Windows 10.☆10Aug 16, 2024Updated last year
- Injects shellcode into remote processes using direct syscalls☆77Dec 30, 2020Updated 5 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- A small tool to patch PE files' import address table with an external payload DLL.☆16Feb 15, 2026Updated last month
- Learning Coccinelle☆11Nov 2, 2017Updated 8 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Feb 8, 2023Updated 3 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- ☆15Aug 11, 2020Updated 5 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Open source SDR LTE software suite☆19Jan 11, 2018Updated 8 years ago
- Example managed and unmanaged plugins for CoreHook☆14Mar 3, 2019Updated 7 years ago
- ☆19Mar 21, 2020Updated 5 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- A fake AMSI Provider which can be used for persistence.☆156May 16, 2021Updated 4 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Binary Golf Library☆61May 1, 2021Updated 4 years ago
- Project Ares is a Proof of Concept (PoC) loader written in C/C++ based on the Transacted Hollowing technique☆338Jan 16, 2022Updated 4 years ago
- ☆13Oct 20, 2021Updated 4 years ago
- ROM dump of the MYK82 chip in a Fortezza Card. Successor to the Clipper Chip.☆14Jul 28, 2024Updated last year
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- Extracting Syscall Stub, Modernized☆65Apr 2, 2022Updated 3 years ago