hiding in plain sight: part 2
☆45Jul 11, 2024Updated last year
Alternatives and similar repositories for dirdevil
Users that are interested in dirdevil are comparing it to the libraries listed below
Sorting:
- ☆15Aug 17, 2023Updated 2 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- CLI to facilitate the use of video-loops as desktop background☆11Jan 3, 2026Updated 2 months ago
- ☆13Dec 24, 2023Updated 2 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Jul 12, 2025Updated 7 months ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆55Jun 19, 2024Updated last year
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- nostr relays list that is generated automatically☆15Sep 3, 2025Updated 6 months ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- ☆16May 29, 2024Updated last year
- Black box pen-testing and web based CTFs☆17Mar 6, 2023Updated 3 years ago
- Process Hollowing in Rust with Process Executable Relocation Support for both 32 and 64 bit architecture environments.☆22Jan 6, 2025Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆96Oct 7, 2024Updated last year
- Simple DLL and client app that work together to hook all the functions in WinHvPlatform.dll in order to provide logging and introspection…☆21Dec 1, 2021Updated 4 years ago
- A protocol for decentralized DNS based on Bitcoin and Nostr.☆16Nov 26, 2023Updated 2 years ago
- ☆22Jan 29, 2025Updated last year
- A C++ Yara Rule Runner☆13Apr 22, 2022Updated 3 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Shmoocon 2019 Firetalk☆21Jan 18, 2019Updated 7 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Jul 19, 2024Updated last year
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 4 months ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆17Jul 26, 2024Updated last year
- ☆54Oct 6, 2025Updated 5 months ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆459Aug 2, 2024Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- Indirect Syscall with TartarusGate Approach in Go☆135Jul 8, 2025Updated 7 months ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- Six cases demonstrating methods of optimizing GetProcAddress☆18Jan 3, 2022Updated 4 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- ☆18Feb 14, 2019Updated 7 years ago