rec0de / bytewitchView external linksLinks
Instant, in-browser decoding of ProtoBuf, bplist, ASN.1, NSArchive, and OPACK payloads
☆38Feb 6, 2026Updated last week
Alternatives and similar repositories for bytewitch
Users that are interested in bytewitch are comparing it to the libraries listed below
Sorting:
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- Information on known exploits☆12Aug 15, 2025Updated 5 months ago
- Repository will contain a tool to generate Peripheral Access Crates in Rust.☆17Nov 5, 2025Updated 3 months ago
- A SKILL.md for ipsw☆37Jan 27, 2026Updated 2 weeks ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Protocol Reverse Engineering Workbench☆22Apr 15, 2025Updated 9 months ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Aug 25, 2025Updated 5 months ago
- SIFA-based attacks on AES☆38Dec 14, 2024Updated last year
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51May 16, 2025Updated 8 months ago
- ☆11Aug 31, 2019Updated 6 years ago
- ☆163Nov 19, 2025Updated 2 months ago
- Experimenting with the Launch Services system on iOS and macOS☆54Nov 20, 2024Updated last year
- Validates priv escalation of AD trusts☆48Apr 1, 2025Updated 10 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Oct 11, 2025Updated 4 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆125Dec 2, 2023Updated 2 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- ☆43Jul 9, 2024Updated last year
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- ☆22Nov 22, 2025Updated 2 months ago
- Library for advanced multihitbox mobs. Can sync hitboxes to geckolib bones☆10Jan 10, 2025Updated last year
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Dynamic_RDS - Plugin for Falcon Player (FPP) to manage an FM transmitter and custom RDS (radio data system) messages similar to what is s…☆12Jan 11, 2026Updated last month
- Tinkering with Scala while reverse engineering Clausewitz (Europa Universalis 4).☆12Sep 14, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆90Dec 28, 2025Updated last month
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆62May 16, 2025Updated 8 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- RAPIDS Deployment Documentation☆15Feb 5, 2026Updated last week
- A set of Rust libraries to interact with apple's private APIs and servers.☆16Jan 10, 2026Updated last month
- Ninja Keys fork!☆11Jan 3, 2025Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Pop Tesla Charge Ports open with your YS1 and rfcat☆13May 31, 2022Updated 3 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 8 years ago