vokac / F2B
Fail2ban for Windows
☆41Updated 7 years ago
Alternatives and similar repositories for F2B
Users that are interested in F2B are comparing it to the libraries listed below
Sorting:
- Post-explotation Hacks☆14Updated 6 years ago
- modzero DNS Masquerading Server for Windows☆46Updated 6 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 7 years ago
- A simple shellcode runner☆20Updated 11 years ago
- C++ WinSock2 PCAP with RDI☆13Updated 8 years ago
- DLL Injection commandline utility☆26Updated 12 years ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 6 years ago
- KeePass Two-Channel Auto-Type Obfuscation Keylogger☆11Updated 9 years ago
- A simple reflective dll example☆19Updated 8 years ago
- EventList - the Baseline Event Analyzer☆11Updated 5 years ago
- Windows Syslog Command Line Client☆15Updated 12 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- DNS TCP to UDP proxy☆9Updated 9 years ago
- Low-level MS Windows registry files analysis tools☆20Updated 9 years ago
- Windows DLL Loading Utility☆11Updated 4 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago
- RC4 Encryption with CryptoAPI and C☆15Updated 9 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 6 years ago
- Zerokit server controller☆13Updated 6 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- Generate RSA keys, encrypt and decrypt data☆24Updated 4 years ago
- Dump all information about a process or thread token.☆10Updated 14 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆37Updated 8 years ago
- Code Injector Using Code Caves☆14Updated 9 years ago
- ☆11Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago