☆25Mar 23, 2026Updated last month
Alternatives and similar repositories for skidstorm
Users that are interested in skidstorm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Feb 15, 2022Updated 4 years ago
- ☆22Apr 11, 2025Updated last year
- Simple anti-instrumentation with EFLAGS.AC☆17Mar 31, 2025Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- NFC MiTM made with two PN532 readers and a Raspberry Pi.☆34Jan 20, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan …☆213Dec 8, 2025Updated 5 months ago
- Kernel Cache Decryption for iOS☆17Nov 16, 2021Updated 4 years ago
- WinDbg workplace settings that I use for debugging☆18Aug 3, 2017Updated 8 years ago
- Small OBJ/Archive Obfuscation framework☆14Nov 9, 2023Updated 2 years ago
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- RE for champions☆15Updated this week
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆15May 24, 2022Updated 3 years ago
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆16Jun 4, 2025Updated 11 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- A GNU Radio on-off keying transmitter☆14Sep 13, 2019Updated 6 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Dumps from a collection of hotel room keys for analysis☆13Oct 19, 2020Updated 5 years ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆64Feb 26, 2025Updated last year
- Fuzz 403/401ing endpoints for bypasses☆11Aug 14, 2020Updated 5 years ago
- Some aimware scripts☆10Feb 6, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- XrefGen is a professional-grade cross-reference generator that detects indirect references and complex control-flow patterns that IDA Pro…☆30Feb 1, 2026Updated 3 months ago
- Golang Implementation of Hell's gate☆21May 31, 2023Updated 2 years ago
- Null-free shellcode for TCP reverse shell on Windows x64☆61Feb 19, 2024Updated 2 years ago
- This is a simple library for Delphi that provides a CancellationTokenSource and CancellationToken much like those in .NET☆20Apr 19, 2026Updated 2 weeks ago
- ☆16Mar 22, 2023Updated 3 years ago
- Fluently detect security measures in software.☆33Oct 26, 2025Updated 6 months ago
- ProxmarkIII mods and designs made for the wild☆13Sep 23, 2016Updated 9 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆24Nov 9, 2023Updated 2 years ago
- SightHouse is a tool designed to assist reverse engineers by retrieving information and metadata from programs and identifying similar fu…☆69Apr 27, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Probe domains for as much information and site structure as possible.☆14Jul 18, 2024Updated last year
- Android App that genereates passcode authentication codes for Postfinance cards☆12Feb 22, 2022Updated 4 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- ☆16Aug 25, 2025Updated 8 months ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago