wishihab / JarProtectorLinks
Jar Protector - Jar Crypter
☆14Updated 7 years ago
Alternatives and similar repositories for JarProtector
Users that are interested in JarProtector are comparing it to the libraries listed below
Sorting:
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 5 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- ☆14Updated 6 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- Hide Mimikatz From Process Lists☆18Updated 10 years ago
- Code injection via delay load libraries☆35Updated 8 years ago
- Telegram-based PowerShell Runspace Host☆11Updated 2 years ago
- interesting analysis☆16Updated 7 years ago
- ☆54Updated 7 years ago
- ☆17Updated 7 years ago
- ACTIVELabs Security Advisories☆23Updated 4 years ago
- ☆45Updated 7 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- ☆13Updated 5 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 8 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Updated 6 years ago
- ☆13Updated 7 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Updated 3 years ago
- Monitor the textual data pasted into Windows clipboard☆29Updated 6 years ago
- ☆11Updated 6 years ago
- Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- ☆33Updated 10 years ago