☆28Apr 1, 2018Updated 7 years ago
Alternatives and similar repositories for sRDI
Users that are interested in sRDI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Go wrapper for in-memory DLL module loader, MemoryModule☆32Feb 13, 2018Updated 8 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Windows build files for the VMHunt Intel PIN Trace tool☆19Nov 26, 2018Updated 7 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- ☆15Mar 8, 2017Updated 9 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger☆21Apr 4, 2018Updated 7 years ago
- Windows_OS_Internals_Curriculum_Resource_Kit-ACADEMIC☆27Nov 17, 2018Updated 7 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆55Oct 25, 2018Updated 7 years ago
- ☆22May 25, 2017Updated 8 years ago
- ☆29Jan 15, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆41Jun 26, 2017Updated 8 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- use https://github.com/argp/iBoot64helper which is the orginal repo and far more advanced☆33Sep 2, 2019Updated 6 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Simple VM-based scripting language☆13Feb 25, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆34Jul 28, 2018Updated 7 years ago
- load macho files in memory without touching the Disk☆44Sep 16, 2022Updated 3 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- ☆14May 8, 2017Updated 8 years ago
- ☆13Nov 1, 2017Updated 8 years ago
- A collection of Windows Administrator tools☆18Jan 1, 2014Updated 12 years ago
- ☆14Feb 23, 2018Updated 8 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Nov 2, 2023Updated 2 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆34Mar 27, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- CVE-2020-17008 splWOW64 Elevation of Privilege☆46Dec 24, 2020Updated 5 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- 使用VS2017编译Nginx,方便调测☆16Mar 4, 2018Updated 8 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Nov 3, 2018Updated 7 years ago