skelsec / aiowinreg
Registry hive parsing the async way
☆21Updated last week
Alternatives and similar repositories for aiowinreg:
Users that are interested in aiowinreg are comparing it to the libraries listed below
- ☆12Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Updated last year
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆19Updated 4 years ago
- wsnet☆24Updated this week
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A collection of my presentation materials.☆16Updated 10 months ago
- Parser for Windows PowerShell script block logs☆13Updated 2 months ago
- Loading and executing shellcode in C# without PInvoke.☆20Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Platform independent library for interfacing windows security descriptors☆16Updated 2 months ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated last year
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- C# project to Reflectively load .Net assemblies in memory☆17Updated 9 months ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆27Updated 5 years ago
- ☆12Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Updated 3 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- ☆35Updated 9 months ago
- ☆15Updated last year
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Some of my custom "tools".☆22Updated 3 years ago