Different code-injections techniques under a common tool
☆30May 3, 2020Updated 6 years ago
Alternatives and similar repositories for alkaline-injector
Users that are interested in alkaline-injector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yet another collection of Frida scripts.☆21Mar 6, 2022Updated 4 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- ☆51Apr 13, 2020Updated 6 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Windows Kernel Programming☆135May 11, 2020Updated 6 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 5 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 6 months ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- CVE-2020-9548:FasterXML/jackson-databind 远程代码执行漏洞☆24Mar 2, 2020Updated 6 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- Remove API hooks from a Beacon process.☆77Mar 13, 2022Updated 4 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 5 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- with metasploit☆63Apr 19, 2020Updated 6 years ago
- ☆28Jun 18, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆21Aug 29, 2022Updated 3 years ago
- Some scripts for penetration testing☆30Dec 29, 2018Updated 7 years ago
- Simple Neo4j PowerShell Wrapper☆30Oct 24, 2019Updated 6 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Jun 19, 2021Updated 4 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 6 years ago
- Build a Jekyll blog in minutes, without touching the command line.☆16Dec 6, 2018Updated 7 years ago
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Jun 8, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- named pipe server with impersonation☆59May 11, 2019Updated 7 years ago
- ☆23Mar 25, 2019Updated 7 years ago
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Oct 17, 2018Updated 7 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- Copy-on-write fork()-like memory dump using Process Snapshotting APIs☆13Jul 23, 2017Updated 8 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago