This toolkit detects applications vulnerable to DLL hijacking (released in 2010)
☆54Oct 16, 2014Updated 11 years ago
Alternatives and similar repositories for DLLHijackAuditKit
Users that are interested in DLLHijackAuditKit are comparing it to the libraries listed below
Sorting:
- Detects DLL hijacking in running processes on Windows systems☆156Apr 2, 2015Updated 10 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated last month
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Feb 19, 2015Updated 11 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive…☆13Jul 4, 2024Updated last year
- Use powershell to getsystem with token dumplication☆10Dec 6, 2019Updated 6 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆14Feb 13, 2025Updated last year
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- A collection of prompts for people that want to learn more about cybersecurity topics.☆16Mar 31, 2023Updated 2 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- Your last stop for password list generation needs!☆27Mar 4, 2015Updated 11 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- Burp extension that checks for interesting and security headers☆44Aug 12, 2020Updated 5 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- A simple DLL that can intercept HID messages and pass them on to the real HID DLL, while logging the data.☆23Oct 3, 2014Updated 11 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- TLS SNI virtual hosts bruteforcer☆21Aug 26, 2014Updated 11 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Cs-Sleep-Mask-Fiber☆18May 16, 2025Updated 9 months ago