vokac / F2B
Fail2ban for Windows
☆38Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for F2B
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 7 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 7 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- Capture Webcam Reflective Dll☆8Updated 8 years ago
- Generate RSA keys, encrypt and decrypt data☆24Updated 3 years ago
- MSTSC Packet Dump Utility☆27Updated 2 years ago
- Post-explotation Hacks☆14Updated 5 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆16Updated 4 years ago
- Library for Windows XML Event Log (EVTX) data types☆17Updated last month
- C++ WinSock2 PCAP with RDI☆13Updated 8 years ago
- Low-level MS Windows registry files analysis tools☆19Updated 8 years ago
- radare2 script to help on COM objects reverse engineering☆11Updated 7 years ago
- This repository contains Ansible scripts which will install and configure tools necessary to effectively debug and profile applications o…☆20Updated 2 years ago
- A simple shellcode runner☆20Updated 10 years ago
- Windows DLL Loading Utility☆10Updated 4 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆36Updated 7 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- EventList - the Baseline Event Analyzer☆11Updated 5 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 9 years ago
- DLL Injection commandline utility☆25Updated 11 years ago
- Run Managed Assemblies with RunDll☆16Updated 6 years ago
- Common Malware Techniques☆13Updated last year
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 6 years ago
- reverse socks tunneler with ntlm and proxy support☆27Updated 5 years ago
- ☆27Updated 6 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 4 months ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 6 years ago
- Removal of certain event logs within a Windows OS☆7Updated 5 years ago