Different code-injections techniques under a common tool
☆30May 3, 2020Updated 5 years ago
Alternatives and similar repositories for alkaline-injector
Users that are interested in alkaline-injector are comparing it to the libraries listed below
Sorting:
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 4 months ago
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Oct 17, 2018Updated 7 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- ☆51Apr 13, 2020Updated 5 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 4 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- Windows Kernel Programming☆133May 11, 2020Updated 5 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆21Apr 2, 2025Updated 11 months ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- just an experiment☆22Sep 5, 2018Updated 7 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- named pipe server with impersonation☆59May 11, 2019Updated 6 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Jan 13, 2023Updated 3 years ago
- Remove API hooks from a Beacon process.☆76Mar 13, 2022Updated 3 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated 3 weeks ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- ☆28Feb 16, 2022Updated 4 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Jun 8, 2017Updated 8 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- Kernel Hacking study materials collection☆108Jul 14, 2016Updated 9 years ago
- ☆23Mar 25, 2019Updated 6 years ago
- ☆11Dec 21, 2020Updated 5 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Jun 26, 2020Updated 5 years ago