Automated Cyber Offense
☆89Apr 9, 2019Updated 6 years ago
Alternatives and similar repositories for cyberweapons
Users that are interested in cyberweapons are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Windows inject☆17Jun 7, 2018Updated 7 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 12 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 4 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14Jan 10, 2017Updated 9 years ago
- ☆30May 23, 2017Updated 8 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- Static library and headers for linking your software with ntdll.dll☆37Dec 16, 2019Updated 6 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Jan 15, 2014Updated 12 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- Performance Monitor Volatile Environment LPE☆18Jun 28, 2025Updated 9 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 9 months ago
- ShellcodeVM☆15Jun 20, 2016Updated 9 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Hidden module/dll detector for windows apps☆15May 21, 2017Updated 8 years ago
- Detect the SCI in windows.☆11Mar 23, 2017Updated 9 years ago
- reversed emet tool☆24Oct 14, 2012Updated 13 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Windows hard shutdown shellcode. Don't need administrator rights.☆14Mar 31, 2016Updated 9 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Mar 22, 2017Updated 9 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- ☆27Apr 4, 2019Updated 6 years ago
- ☆12Dec 15, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- midfunction d3d basehook for winxp, win7, win8, win10☆17Jan 21, 2019Updated 7 years ago
- ☆14Feb 27, 2017Updated 9 years ago
- ☆82Dec 3, 2017Updated 8 years ago
- 反外挂带CRC校 验☆26Jul 26, 2016Updated 9 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago