vokac / F2B
Fail2ban for Windows
☆37Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for F2B
- C++ WinSock2 PCAP with RDI☆13Updated 8 years ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 6 years ago
- Removal of certain event logs within a Windows OS☆7Updated 5 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- Windows DLL Loading Utility☆10Updated 4 years ago
- Capture Webcam Reflective Dll☆8Updated 8 years ago
- Post-explotation Hacks☆14Updated 5 years ago
- Low-level MS Windows registry files analysis tools☆19Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 8 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Library for Windows XML Event Log (EVTX) data types☆17Updated last month
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 7 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆16Updated 4 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 9 years ago
- A simple reflective dll example☆18Updated 7 years ago
- DNS TCP to UDP proxy☆8Updated 9 years ago
- EventList - the Baseline Event Analyzer☆11Updated 5 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 4 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 6 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 7 years ago
- Generate RSA keys, encrypt and decrypt data☆24Updated 3 years ago
- Very very useful example of loading and relocating the (Win32) DLL from memory (!) which allows many possibilities and much more flexibil…☆21Updated 11 years ago
- Zerokit shared code☆16Updated 5 years ago
- Common Malware Techniques☆13Updated last year
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 6 years ago