This toolkit detects applications vulnerable to DLL hijacking (released in 2010)
☆54Oct 16, 2014Updated 11 years ago
Alternatives and similar repositories for DLLHijackAuditKit
Users that are interested in DLLHijackAuditKit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- Detects DLL hijacking in running processes on Windows systems☆155Apr 2, 2015Updated 10 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- Cs-Sleep-Mask-Fiber☆18May 16, 2025Updated 10 months ago
- A tools help you to get root.☆15Dec 19, 2016Updated 9 years ago
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆18Oct 29, 2014Updated 11 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- Your last stop for password list generation needs!☆27Mar 4, 2015Updated 11 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated 2 months ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- Credentials recovery project☆11May 12, 2015Updated 10 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- Use powershell to getsystem with token dumplication☆10Dec 6, 2019Updated 6 years ago
- https://jira.atlassian.com/browse/JRASERVER-69793☆10Sep 16, 2019Updated 6 years ago
- Collection of sources by RU VX'er Indy (Indy, Clerk)☆13Sep 4, 2015Updated 10 years ago
- Burp extension that checks for interesting and security headers☆44Aug 12, 2020Updated 5 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- Php Codz Hacking☆21Sep 5, 2015Updated 10 years ago
- WD My Cloud PoC exploit☆42May 22, 2019Updated 6 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- .Net PlugIn For x64dbg☆20Feb 27, 2018Updated 8 years ago
- Files from Zeronights presentation.☆28Nov 23, 2012Updated 13 years ago