All Projects → Memory.dll → Similar Projects or Alternatives

710 Open source projects that are alternatives of or similar to Memory.dll

Memoryjs
Read and write process memory in Node.js (Windows API functions exposed via Node bindings)
Stars: ✭ 371 (-9.73%)
Mutual labels:  memory, hacking
Dll hook Rs
Rust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-86.13%)
Mutual labels:  memory, hacking
Ysf
YSF Server Functions
Stars: ✭ 77 (-81.27%)
Mutual labels:  memory, hacking
Arch
极客时间专栏《许式伟的架构课》相关的源代码:冯诺伊曼结构
Stars: ✭ 335 (-18.49%)
Mutual labels:  memory
Cve 2019 0708
3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Stars: ✭ 350 (-14.84%)
Mutual labels:  hacking
Awesome Cyber Security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Stars: ✭ 333 (-18.98%)
Mutual labels:  hacking
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-7.06%)
Mutual labels:  hacking
Ctf Writeups Public
Writeups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (-19.46%)
Mutual labels:  hacking
W5
Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (-10.71%)
Mutual labels:  hacking
Pivotsuite
Network Pivoting Toolkit
Stars: ✭ 329 (-19.95%)
Mutual labels:  hacking
Osint tips
OSINT
Stars: ✭ 322 (-21.65%)
Mutual labels:  hacking
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (-14.11%)
Mutual labels:  hacking
Ipapatch
Patch iOS Apps, The Easy Way, Without Jailbreak.
Stars: ✭ 3,837 (+833.58%)
Mutual labels:  hacking
Vault
swiss army knife for hackers
Stars: ✭ 346 (-15.82%)
Mutual labels:  hacking
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-5.84%)
Mutual labels:  hacking
Ctf
CTF (Capture The Flag) writeups, code snippets, notes, scripts
Stars: ✭ 336 (-18.25%)
Mutual labels:  hacking
Zines
Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference
Stars: ✭ 370 (-9.98%)
Mutual labels:  hacking
Memeye
👀 The eye of memory. A lightweight memory monitor and dashboard for Node.js application on development.
Stars: ✭ 332 (-19.22%)
Mutual labels:  memory
Archstrike
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-2.43%)
Mutual labels:  hacking
Awesome Web Hacking
A list of web application security
Stars: ✭ 3,760 (+814.84%)
Mutual labels:  hacking
K8tools
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+915.33%)
Mutual labels:  hacking
Eqgrp
Decrypted content of eqgrp-auction-file.tar.xz
Stars: ✭ 3,743 (+810.71%)
Mutual labels:  hacking
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-34.55%)
Mutual labels:  hacking
Taipan
Web application vulnerability scanner
Stars: ✭ 359 (-12.65%)
Mutual labels:  hacking
Awesome Hacking Lists
平常看到好的渗透hacking工具和多领域效率工具的集合
Stars: ✭ 311 (-24.33%)
Mutual labels:  hacking
Richkware
Framework for building Windows malware, written in C++
Stars: ✭ 315 (-23.36%)
Mutual labels:  hacking
Swap digger
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-13.87%)
Mutual labels:  hacking
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+912.65%)
Mutual labels:  hacking
Proxy List
Get PROXY List that gets updated everyday
Stars: ✭ 347 (-15.57%)
Mutual labels:  hacking
Nmap
Idiomatic nmap library for go developers
Stars: ✭ 391 (-4.87%)
Mutual labels:  hacking
Eos Bp Nodes Security Checklist
EOS bp nodes security checklist(EOS超级节点安全执行指南)
Stars: ✭ 347 (-15.57%)
Mutual labels:  hacking
Rustscan
🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+1169.59%)
Mutual labels:  hacking
Lmdb Embeddings
Fast word vectors with little memory usage in Python
Stars: ✭ 404 (-1.7%)
Mutual labels:  memory
Technical Whitepapers
Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.
Stars: ✭ 359 (-12.65%)
Mutual labels:  hacking
Ctftools
Personal CTF Toolkit
Stars: ✭ 312 (-24.09%)
Mutual labels:  hacking
Ctf Difficulty
This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Stars: ✭ 338 (-17.76%)
Mutual labels:  hacking
Tradfri Hacking
Hacking IKEA TRÅDFRI products, such as light bulbs, window blinds and other accessories.
Stars: ✭ 367 (-10.71%)
Mutual labels:  hacking
Socialbox Termux
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By init__0 for termux on android
Stars: ✭ 324 (-21.17%)
Mutual labels:  hacking
Pig
A Linux packet crafting tool.
Stars: ✭ 384 (-6.57%)
Mutual labels:  hacking
Billcipher
Information Gathering tool for a Website or IP address
Stars: ✭ 332 (-19.22%)
Mutual labels:  hacking
Chromepass
Chromepass - Hacking Chrome Saved Passwords
Stars: ✭ 364 (-11.44%)
Mutual labels:  hacking
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-20.19%)
Mutual labels:  hacking
Apkurlgrep
Extract endpoints from APK files
Stars: ✭ 405 (-1.46%)
Mutual labels:  hacking
Malconfscan
Volatility plugin for extracts configuration data of known malware
Stars: ✭ 327 (-20.44%)
Mutual labels:  memory
Pidusage
Cross-platform process cpu % and memory usage of a PID
Stars: ✭ 364 (-11.44%)
Mutual labels:  memory
Langhost
👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-21.17%)
Mutual labels:  hacking
Email2phonenumber
A OSINT tool to obtain a target's phone number just by having his email address
Stars: ✭ 379 (-7.79%)
Mutual labels:  hacking
Airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+831.87%)
Mutual labels:  hacking
Anymethodlog
Log any method call of object in Objective-C
Stars: ✭ 361 (-12.17%)
Mutual labels:  hacking
Osintgram
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (-24.09%)
Mutual labels:  hacking
Thc Tesla Powerwall2 Hack
TESLA PowerWall 2 Security Shenanigans
Stars: ✭ 399 (-2.92%)
Mutual labels:  hacking
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-24.09%)
Mutual labels:  hacking
Ssrf vulnerable lab
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (-12.17%)
Mutual labels:  hacking
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+1302.19%)
Mutual labels:  hacking
Poc
Advisories, proof of concept files and exploits that have been made public by @pedrib.
Stars: ✭ 376 (-8.52%)
Mutual labels:  hacking
Awesome Sec Talks
A collected list of awesome security talks
Stars: ✭ 3,411 (+729.93%)
Mutual labels:  hacking
Oscp Human Guide
My own OSCP guide
Stars: ✭ 358 (-12.9%)
Mutual labels:  hacking
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+0.49%)
Mutual labels:  hacking
Packetwhisper
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-1.46%)
Mutual labels:  hacking
Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (-3.89%)
Mutual labels:  hacking
1-60 of 710 similar projects