Community maintained list of most popular HIPS service and process names on a Windows Platform.
☆43Jan 7, 2026Updated 2 months ago
Alternatives and similar repositories for HIPS_LIPS
Users that are interested in HIPS_LIPS are comparing it to the libraries listed below
Sorting:
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 5 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- Incident Response Scripts☆30Mar 1, 2020Updated 6 years ago
- ☆12Feb 19, 2026Updated 2 weeks ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Use powershell to list the RDP Connections History of logged-in users or all users☆264Apr 17, 2021Updated 4 years ago
- UAdmin Phishlets for common sites☆16Jun 12, 2025Updated 8 months ago
- a sandbox project by sudami☆17Jul 31, 2018Updated 7 years ago
- ☆42Jan 13, 2023Updated 3 years ago
- Plugin for x64dbg to disable parallel loading of dependencies☆19Sep 3, 2022Updated 3 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Simple and sane compression wrapper library.☆19Oct 28, 2022Updated 3 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- ☆40May 21, 2022Updated 3 years ago
- ☆17Sep 3, 2015Updated 10 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- \B\C\M\C\ Open Source Software☆20Jan 3, 2022Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- ☆82Dec 29, 2020Updated 5 years ago
- An implementation of PSExec in C#☆337Dec 1, 2020Updated 5 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆263Apr 24, 2021Updated 4 years ago
- ☆23May 28, 2021Updated 4 years ago
- Evade sysmon and windows event logging☆625Apr 8, 2020Updated 5 years ago
- My pentest tools used two years ago.☆21May 11, 2017Updated 8 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- a patched sshd for red team activities☆84Aug 8, 2021Updated 4 years ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆95Feb 19, 2026Updated 2 weeks ago
- a simple portforwarder in ps1 with embeded c# code☆90Jun 30, 2018Updated 7 years ago
- Tiny library to parse the subdomain, domain, and tld extension from a host string☆23Apr 1, 2022Updated 3 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- ☆153Jan 6, 2023Updated 3 years ago
- A old way to Persistence☆53Sep 24, 2020Updated 5 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Aug 6, 2021Updated 4 years ago