studio-fluffy / angewandte_mathematikView external linksLinks
Vorlesungsunterlagen angewandte Mathematik an der DHBW
☆14Nov 1, 2025Updated 3 months ago
Alternatives and similar repositories for angewandte_mathematik
Users that are interested in angewandte_mathematik are comparing it to the libraries listed below
Sorting:
- SyzScope is a research project that aims to reveal high-risk security bug from Syzbot. Learn more details in our paper.☆24Nov 17, 2021Updated 4 years ago
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago
- transpile llil to c++ for execution and testing☆48Jan 11, 2024Updated 2 years ago
- ☆81Sep 7, 2023Updated 2 years ago
- Good CLR Host with Native patchless AMSI Bypass☆102Apr 18, 2025Updated 9 months ago
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆454Dec 27, 2025Updated last month
- Yet another LLVM-based obfuscator☆124Sep 3, 2024Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆473Aug 21, 2024Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆133Apr 26, 2023Updated 2 years ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆154Aug 4, 2025Updated 6 months ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆148Sep 8, 2022Updated 3 years ago
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆167Apr 22, 2022Updated 3 years ago
- ☆186Jun 14, 2025Updated 8 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆214Oct 19, 2024Updated last year
- ☆177Jun 18, 2023Updated 2 years ago
- An App Domain Manager Injection DLL PoC on steroids☆211Dec 14, 2023Updated 2 years ago
- ☆835Dec 13, 2022Updated 3 years ago
- Make everyone in your VLAN ASRep roastable☆247Oct 7, 2025Updated 4 months ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Jun 9, 2020Updated 5 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆230Mar 23, 2023Updated 2 years ago
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆254Oct 16, 2024Updated last year
- A python script developed to process Windows memory images based on triage type.☆264Nov 25, 2023Updated 2 years ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆259Mar 13, 2024Updated last year
- yet another AV killer tool using BYOVD☆304Dec 12, 2023Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆265Aug 31, 2022Updated 3 years ago
- Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vu…☆271Oct 2, 2021Updated 4 years ago
- 🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system☆305May 7, 2025Updated 9 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆314Sep 30, 2025Updated 4 months ago
- ☆307Mar 15, 2025Updated 11 months ago
- Remove API hooks from a Beacon process.☆283Sep 18, 2021Updated 4 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- CTF Archives: Collection of CTF Challenges.☆1,355Feb 8, 2026Updated last week
- symbolic execution plugin for binary ninja☆346Jan 26, 2026Updated 2 weeks ago
- Inject DLLs into the explorer process using icons☆403May 18, 2025Updated 8 months ago
- An implementation of PSExec in C#☆337Dec 1, 2020Updated 5 years ago
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆357Sep 1, 2022Updated 3 years ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆399Sep 26, 2024Updated last year
- ☆341Nov 10, 2025Updated 3 months ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆359Nov 19, 2024Updated last year