Different code-injections techniques under a common tool
☆30May 3, 2020Updated 5 years ago
Alternatives and similar repositories for alkaline-injector
Users that are interested in alkaline-injector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yet another collection of Frida scripts.☆21Mar 6, 2022Updated 4 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- ☆51Apr 13, 2020Updated 5 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- Windows Kernel Programming☆134May 11, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 5 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 5 months ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Jan 13, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆27Mar 18, 2020Updated 6 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- Remove API hooks from a Beacon process.☆76Mar 13, 2022Updated 4 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- ☆28Jun 18, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Some scripts for penetration testing☆30Dec 29, 2018Updated 7 years ago
- Simple Neo4j PowerShell Wrapper☆30Oct 24, 2019Updated 6 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Jun 19, 2021Updated 4 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 6 years ago
- Build a Jekyll blog in minutes, without touching the command line.☆16Dec 6, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- A janky, neo4j based CMDB glued together with PowerShell☆17Oct 24, 2019Updated 6 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Jun 8, 2017Updated 8 years ago
- named pipe server with impersonation☆59May 11, 2019Updated 6 years ago
- ☆23Mar 25, 2019Updated 7 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago