specialbrocoli / LIPiKsLinks
LIPiKs is a modern React dashboard for data analytics and finance, built with Vite, React, Bun, and Tailwind CSS. Monitor your data analytics to increase revenue for BTC, BTB, & SAAS platforms.
☆17Updated 3 weeks ago
Alternatives and similar repositories for LIPiKs
Users that are interested in LIPiKs are comparing it to the libraries listed below
Sorting:
- Centralized resource for listing and organizing known injection techniques and POCs☆588Updated last month
- Because AV evasion should be easy.☆767Updated 7 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆988Updated last month
- Complete list of LPE exploits for Windows (starting from 2023)☆806Updated last week
- Malware Development for Ethical Hackers, published by Packt☆349Updated 7 months ago
- Volatility3 MCP Server for automating Memory Forensics☆12Updated last week
- This is for Ethical Use only.☆415Updated last month
- Analyse your malware to surgically obfuscate it☆483Updated last month
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆676Updated last month
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,030Updated last year
- ⚠️ malware development☆570Updated last year
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,136Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆698Updated 4 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆718Updated 5 months ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆815Updated last year
- Cybersecurity research results. Simple C/C++ and Python implementations☆246Updated this week
- Awesome EDR Bypass Resources For Ethical Hacking☆1,245Updated last month
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,190Updated last year
- Pure Malware Development Resource Collections☆317Updated 6 months ago
- ☆331Updated last month
- AV/EDR Lab environment setup references to help in Malware development