t94j0 / zybook
Solves zybooks answers
☆11Updated 6 years ago
Alternatives and similar repositories for zybook:
Users that are interested in zybook are comparing it to the libraries listed below
- A collection of tools for debugging Windows application crashes.☆9Updated 3 years ago
- Showing how proof-of-work can be used to evade antivirus emulators.☆11Updated 5 months ago
- the most basic DLL ever to pop a cmd.☆24Updated 4 years ago
- ☆9Updated 4 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Updated 5 years ago
- ☆18Updated 4 years ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- Alpine hostapd-mana based RADIUS server☆10Updated last year
- A tool to sync mythic events with ghostwriter oplog.☆13Updated 5 months ago
- Spoof parent process ID☆13Updated 6 years ago
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- Loading and executing shellcode in C# without PInvoke.☆20Updated 3 years ago
- ☆22Updated last year
- Arya is a simple obfuscator for .NET binaries.☆39Updated 7 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Updated 3 years ago
- ☆11Updated 4 years ago
- Restructuring Audio Files from the Headspace Guided Meditation App to Reduce Server-Side Bandwidth Costs by more than 40%☆11Updated 7 years ago
- Password spray wrapper for OpenConnect VPN client☆11Updated 4 years ago
- Golang CLI binary used for installing and managing Ghostwriter☆18Updated last week
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- ☆14Updated 3 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Updated 4 years ago
- NetSPI HTTP Scrapers☆28Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- ☆16Updated 6 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- Horizontal Brute Forcing tool for OWA☆9Updated 7 years ago