v1ado / HIPS_LIPSView external linksLinks
Community maintained list of most popular HIPS service and process names on a Windows Platform.
☆43Jan 7, 2026Updated last month
Alternatives and similar repositories for HIPS_LIPS
Users that are interested in HIPS_LIPS are comparing it to the libraries listed below
Sorting:
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 5 years ago
- Incident Response Scripts☆30Mar 1, 2020Updated 5 years ago
- ☆12Jan 7, 2025Updated last year
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 3 months ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Use powershell to list the RDP Connections History of logged-in users or all users☆265Apr 17, 2021Updated 4 years ago
- UAdmin Phishlets for common sites☆16Jun 12, 2025Updated 8 months ago
- a sandbox project by sudami☆17Jul 31, 2018Updated 7 years ago
- ☆42Jan 13, 2023Updated 3 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- An implementation of the Process Hollowing technique.☆16Dec 13, 2020Updated 5 years ago
- Plugin for x64dbg to disable parallel loading of dependencies☆19Sep 3, 2022Updated 3 years ago
- Simple and sane compression wrapper library.☆19Oct 28, 2022Updated 3 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆42Sep 18, 2018Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- An implementation of PSExec in C#☆337Dec 1, 2020Updated 5 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆264Apr 24, 2021Updated 4 years ago
- ☆24May 28, 2021Updated 4 years ago
- Evade sysmon and windows event logging☆624Apr 8, 2020Updated 5 years ago
- a patched sshd for red team activities☆84Aug 8, 2021Updated 4 years ago
- My pentest tools used two years ago.☆21May 11, 2017Updated 8 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆94Jun 27, 2025Updated 7 months ago
- a simple portforwarder in ps1 with embeded c# code☆90Jun 30, 2018Updated 7 years ago
- Tiny library to parse the subdomain, domain, and tld extension from a host string☆23Apr 1, 2022Updated 3 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- ☆152Jan 6, 2023Updated 3 years ago
- A old way to Persistence☆53Sep 24, 2020Updated 5 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Apr 8, 2021Updated 4 years ago
- In-memory token vault BOF for Cobalt Strike☆149Aug 18, 2022Updated 3 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Aug 6, 2021Updated 4 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Aug 25, 2017Updated 8 years ago