Vorlesungsunterlagen angewandte Mathematik an der DHBW
☆14Nov 1, 2025Updated 6 months ago
Alternatives and similar repositories for angewandte_mathematik
Users that are interested in angewandte_mathematik are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- PurpleCrew based on CrewAI with AI agents☆29May 1, 2025Updated last year
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Mar 18, 2020Updated 6 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆37Sep 26, 2023Updated 2 years ago
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆134Mar 16, 2026Updated last month
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆28May 7, 2025Updated 11 months ago
- A python library to find one-gadget☆31Feb 22, 2019Updated 7 years ago
- Example/starter code for custom Windows application compatibility shims☆38Dec 27, 2020Updated 5 years ago
- transpile llil to c++ for execution and testing☆48Jan 11, 2024Updated 2 years ago
- Tools that trigger False Positive AV alerts☆56Dec 24, 2024Updated last year
- Red Team tools, infrastructure, and hardware weaponized☆113Apr 17, 2026Updated 2 weeks ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆473Aug 21, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆468Apr 12, 2026Updated 3 weeks ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Jan 18, 2022Updated 4 years ago
- Second Part To Hell's artworks: artificial (life/evolution/intelligence)☆186Jan 21, 2024Updated 2 years ago
- Good CLR Host with Native patchless AMSI Bypass☆108Apr 18, 2025Updated last year
- Yet another LLVM-based obfuscator☆126Sep 3, 2024Updated last year
- Obfuscator as LLVM extension☆109Apr 15, 2022Updated 4 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Sep 8, 2022Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆154Aug 4, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆146Dec 31, 2023Updated 2 years ago
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆167Apr 22, 2022Updated 4 years ago
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆306May 7, 2025Updated 11 months ago
- ☆851Dec 13, 2022Updated 3 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- An App Domain Manager Injection DLL PoC on steroids☆213Dec 14, 2023Updated 2 years ago
- ☆188Jun 14, 2025Updated 10 months ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Jun 9, 2020Updated 5 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CTF Archives: Collection of CTF Challenges.☆1,435Updated this week
- lscan is a library identification tool on statically linked/stripped binaries☆408Dec 1, 2020Updated 5 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆236Mar 23, 2023Updated 3 years ago
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆268Oct 16, 2024Updated last year
- yet another AV killer tool using BYOVD☆312Dec 12, 2023Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆267Aug 31, 2022Updated 3 years ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆264Mar 13, 2024Updated 2 years ago