☆18Dec 9, 2023Updated 2 years ago
Alternatives and similar repositories for ImportlessApi
Users that are interested in ImportlessApi are comparing it to the libraries listed below
Sorting:
- Vuln-dev environment for LuaJIT☆20Dec 30, 2022Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- ☆12Dec 15, 2024Updated last year
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- A library for interacting with Windows through SMB written in Nim.☆16Sep 14, 2025Updated 5 months ago
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- A tiny macro library for protecting sensitive strings in compiled binaries☆40Oct 8, 2024Updated last year
- ☆18Sep 24, 2024Updated last year
- ☆18Jan 9, 2025Updated last year
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- Bypass Malware Time Delays☆107Sep 23, 2022Updated 3 years ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆15Mar 22, 2023Updated 2 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 3 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- NailaoLoader: Hiding Execution Flow via Patching☆22Feb 27, 2025Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- A Rust compiler plugin to encrypt string literal at compile time.☆21Jun 10, 2025Updated 8 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Jan 10, 2024Updated 2 years ago
- WNF Code Execution Library Using C#☆110May 18, 2020Updated 5 years ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- A recursive disassembler written in Python. Most suitable for VMs in CTFs.☆21May 20, 2020Updated 5 years ago
- A Mythic Agent written in PIC C.☆207Feb 4, 2025Updated last year
- A Bumblebee-inspired Crypter☆79Dec 5, 2022Updated 3 years ago
- PowerShell Obfuscation and Data Science☆180May 4, 2022Updated 3 years ago
- A collection of modules and scripts to help with analyzing Nim binaries☆83Oct 7, 2024Updated last year
- ☆22Nov 12, 2022Updated 3 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- ☆413Dec 14, 2023Updated 2 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Self Delete DLL☆23Feb 15, 2024Updated 2 years ago
- ☆90Jun 2, 2024Updated last year
- ☆46Jun 21, 2023Updated 2 years ago