uf0o / alkaline-injectorView external linksLinks
Different code-injections techniques under a common tool
☆30May 3, 2020Updated 5 years ago
Alternatives and similar repositories for alkaline-injector
Users that are interested in alkaline-injector are comparing it to the libraries listed below
Sorting:
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 3 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Oct 17, 2018Updated 7 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆15Feb 20, 2020Updated 5 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- ☆51Apr 13, 2020Updated 5 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 5 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 4 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- CVE-2020-9548:FasterXML/jackson-databind 远程代码执行漏洞☆24Mar 2, 2020Updated 5 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- Windows Kernel Programming☆133May 11, 2020Updated 5 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- just an experiment☆22Sep 5, 2018Updated 7 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Dec 1, 2022Updated 3 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Jan 13, 2023Updated 3 years ago
- named pipe server with impersonation☆60May 11, 2019Updated 6 years ago
- Chaos iOS < 12.1.2 PoC by @S0rryMyBad since he posted it as a photo rather than a source code. Also cleaned up.☆64Mar 23, 2023Updated 2 years ago
- A simple shellcode runner☆22Apr 20, 2014Updated 11 years ago
- Remove API hooks from a Beacon process.☆76Mar 13, 2022Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated this week
- ☆28Feb 16, 2022Updated 4 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- ☆11Dec 21, 2020Updated 5 years ago