Static binary analysis with Detect It Easy — 100% in your browser, no uploads.
☆54Feb 10, 2026Updated 3 weeks ago
Alternatives and similar repositories for die-in-browser
Users that are interested in die-in-browser are comparing it to the libraries listed below
Sorting:
- Tiny C header that allows easy hiding of WinAPI imports via PEB☆41Sep 1, 2025Updated 6 months ago
- Installer unpacker Plugins for 7zip☆51Nov 17, 2025Updated 3 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆89Jan 2, 2026Updated 2 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- ☆12Jan 18, 2026Updated last month
- Just load this .js module and it will start tracking all external calls by a JS-application☆46Dec 17, 2024Updated last year
- https://github.com/wcventure/FuzzingPaper☆10Jan 15, 2022Updated 4 years ago
- run 68000 elf, Motorola hex, and CP/M 68K binaries on Windows, macOS, and Linux☆19Mar 1, 2026Updated last week
- Develop macOS apps on Windows with seamless cross-platform tools.☆16Jun 5, 2025Updated 9 months ago
- Decompilation of the Eft library from NintendoWare for Cafe (Wii U)☆12Jan 15, 2022Updated 4 years ago
- Jedi Knight II Source Code compiled in Visual Studio 2012 & Windows 8 SDK☆26May 19, 2019Updated 6 years ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 10 months ago
- Redirects a specified API for a one time execution of code upon injection into a process.☆15Nov 24, 2020Updated 5 years ago
- Dump Windows registry hives as text.☆17Feb 9, 2019Updated 7 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 8 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆68May 31, 2025Updated 9 months ago
- Decompilation of the EventFlow (evfl) library☆16Nov 15, 2022Updated 3 years ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- Use Markdown content on your site by combining it with HTML! Implemented from scratch with 100% syntax support.☆17Apr 11, 2025Updated 10 months ago
- Templates for developing your own listeners and agents for AdaptixC2.☆45Feb 28, 2026Updated last week
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆111Jan 18, 2026Updated last month
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆74Aug 24, 2025Updated 6 months ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- ☆24Feb 21, 2025Updated last year
- A set of tools and resources for analysis of Havoc C2☆26Feb 27, 2024Updated 2 years ago
- ☆18Oct 6, 2024Updated last year
- Jedi Knight III: Jedi Academy Source Code compiled for modern systems☆28May 30, 2019Updated 6 years ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆102Jan 26, 2026Updated last month
- PE Library x86☆21Aug 5, 2019Updated 6 years ago
- ☆28Feb 11, 2026Updated 3 weeks ago
- A Windows tool that converts LDIF files to BloodHound CE☆27Dec 20, 2025Updated 2 months ago
- XillenStealer V4.0 - Professional cross-platform Python stealer builder with modern UI and comprehensive features. V5.0 - t.me/XillenStea…☆54Feb 23, 2026Updated 2 weeks ago
- A simple cryptor for .NET/Native files with Injection and obfuscation☆55Oct 8, 2024Updated last year
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆62May 16, 2025Updated 9 months ago
- Decompilation & pc port of the Windows Phone version of Sonic CD.☆16Mar 7, 2020Updated 6 years ago