vokac / F2BLinks
Fail2ban for Windows
☆43Updated 7 years ago
Alternatives and similar repositories for F2B
Users that are interested in F2B are comparing it to the libraries listed below
Sorting:
- metasploit loader with antivirus bypass module☆17Updated 9 years ago
- C++ WinSock2 PCAP with RDI☆13Updated 8 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- DNS TCP to UDP proxy☆9Updated 9 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 7 years ago
- Generate RSA keys, encrypt and decrypt data☆24Updated 4 years ago
- A simple shellcode runner☆20Updated 11 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- DHCP attack tool☆20Updated 9 months ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark format☆12Updated 11 years ago
- Capture Webcam Reflective Dll☆8Updated 9 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- it's a simple LKM rootkit.☆12Updated 8 years ago
- EventList - the Baseline Event Analyzer☆11Updated 6 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 7 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Updated 11 years ago
- Windows Syslog Command Line Client☆15Updated 12 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Common Malware Techniques☆13Updated 2 years ago
- Code injection via delay load libraries☆35Updated 7 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 9 months ago
- Anti-AV compilation☆44Updated 11 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Low-level MS Windows registry files analysis tools☆20Updated 9 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Updated 8 years ago
- Based on the research of Windows network architecture and the core packet filtering firewall technology, using NDIS intermediate driver, …☆31Updated 9 years ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 7 years ago