DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.
☆14Jan 24, 2025Updated last year
Alternatives and similar repositories for Signal-DLL-Hijacking
Users that are interested in Signal-DLL-Hijacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Internationalization of Crystal programs.☆10Apr 13, 2021Updated 4 years ago
- Impacket☆50Feb 25, 2026Updated 3 weeks ago
- A minimal abstraction for defining domain models and even domain model specs themselves - quite meta ...☆13Jan 28, 2022Updated 4 years ago
- sms2call app☆15Jul 20, 2025Updated 8 months ago
- ☆46Mar 20, 2021Updated 5 years ago
- no toxic names anymore☆16Jan 5, 2026Updated 2 months ago
- A high level IPv6 subnet planner written in go☆26Aug 1, 2025Updated 7 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- An eBPF-powered intrusion detection system with an end-to-end pipeline for kernel event monitoring, analysis, and visualization☆20Aug 13, 2025Updated 7 months ago
- Blog☆10Jul 18, 2023Updated 2 years ago
- Discover Netflix's Open Connect Appliance (OCA) assigned to your connection. This tool fetches and displays detailed connectivity and hos…☆18Jul 22, 2025Updated 8 months ago
- Vectored Exception Handling Squared☆31Dec 27, 2025Updated 2 months ago
- Some Congestion Experienced☆12Apr 23, 2025Updated 11 months ago
- Customizing flow classification with the sfq, fq_codel, fq_pie and Cake qdiscs using ipsets, tc-flow and eBPF☆10Jul 4, 2021Updated 4 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago
- ☆20Aug 23, 2025Updated 7 months ago
- This is an example RAG pipeline for ingesting private IP Network Design documentation for use with an LLM☆14Nov 5, 2025Updated 4 months ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- AI opera generator, with images☆19Mar 5, 2026Updated 2 weeks ago
- A guide to getting started with Metaphor☆19May 15, 2025Updated 10 months ago
- Tests of L4S☆15Aug 28, 2021Updated 4 years ago
- Simple C2 using GitHub repository as comms channel.☆32Oct 26, 2024Updated last year
- ☆25Feb 19, 2026Updated last month
- Config files for my GitHub profile.☆27Updated this week
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆16Jan 22, 2025Updated last year
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- ☆23Jan 28, 2026Updated last month
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- UAC Bypass using CMSTP in Rust☆36Dec 6, 2024Updated last year
- A Clojure library/app designed to automatically transfer data from MySQL to Datomic.☆18Dec 5, 2023Updated 2 years ago
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆51May 13, 2023Updated 2 years ago
- ☆19May 18, 2023Updated 2 years ago
- ☆27Jul 9, 2025Updated 8 months ago
- ☆163Updated this week