☆18Jul 6, 2020Updated 5 years ago
Alternatives and similar repositories for win-frida-scripts
Users that are interested in win-frida-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆49Dec 28, 2025Updated 4 months ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- Trojan file binder. Compiled by VC6/VS2010 and Tested on Win2000/Win10.☆12Jun 23, 2017Updated 8 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- Patterns for the l7-filter packet classifier (kernel version). You can find new protocols at https://www.netify.ai/resources/protocols☆11Jun 18, 2014Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆10Sep 3, 2017Updated 8 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- Virtual Wireless Router☆10Jul 13, 2015Updated 10 years ago
- Binds two files together and updates the stub accordingly. The stub will then drop and execute both files.☆16Jul 29, 2016Updated 9 years ago
- FreePIE plugin for https://github.com/Stents-/XOutput☆18Dec 7, 2015Updated 10 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- An interactive mock C2 server☆17Feb 25, 2023Updated 3 years ago
- Decrypts and logs a process's SSL traffic.☆26Mar 10, 2021Updated 5 years ago
- 微信网页授权如何获得openID☆12Feb 23, 2018Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- BlurAdmin 干净整洁版☆15Mar 7, 2017Updated 9 years ago
- Code for IJCAI 2019 paper "Real-time Adversarial Attack".☆20Jul 4, 2020Updated 5 years ago
- My version of PoeHud☆18Sep 2, 2020Updated 5 years ago
- Volatility 3 Plugins☆21Oct 3, 2022Updated 3 years ago
- 机器翻译练习☆15Apr 29, 2020Updated 6 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Oct 21, 2019Updated 6 years ago
- A tool to assist with network-based hunting for GRU's Drovorub malware c2☆25Aug 28, 2020Updated 5 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Jul 12, 2021Updated 4 years ago
- 基于ants框架设计的网络请求并发模型☆17Nov 27, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- JDB++ an jdb extension for easily debugging through smali code☆23Jul 18, 2025Updated 9 months ago
- Bof of RegPwn by MDSec☆118Mar 15, 2026Updated last month
- Python implementation of the card game Hearts☆25Oct 25, 2021Updated 4 years ago
- Same code , different CPU case , different build case , Iot bins reverse learning.☆28Mar 8, 2017Updated 9 years ago
- hutrace☆25Jun 6, 2022Updated 3 years ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 11 months ago
- ☆22Feb 14, 2020Updated 6 years ago
- Core Submodule of Exploration C2☆24May 1, 2026Updated last week
- Code for NDSS paper: Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems☆21Nov 24, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for “MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints”☆23Jul 9, 2020Updated 5 years ago
- ☆16Mar 26, 2024Updated 2 years ago
- ☆30May 10, 2023Updated 2 years ago
- Code for the paper 'Variable Selection with Copula Entropy' published on Chinese Journal of Applied Probability and Statistics☆19May 9, 2022Updated 4 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆36May 26, 2019Updated 6 years ago
- StrongVM is a virtualizing protector for .NET applications.☆29Nov 25, 2022Updated 3 years ago
- 东北大学软件学院信息安全专业一些课程的资料(PS:无大作业)☆20Jun 2, 2023Updated 2 years ago