Skip to content
View Reblikr's full-sized avatar

Block or report Reblikr

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.

C++ 46,689 2,028 Updated Jan 21, 2025

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 12,052 4,622 Updated Aug 17, 2020

Run Powershell without software restrictions.

C# 283 47 Updated Sep 8, 2021

Run PowerShell with rundll32. Bypass software restrictions.

C# 1,786 254 Updated Mar 17, 2021

a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )

C# 2,219 224 Updated Nov 2, 2024

Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS

C# 1,461 241 Updated Oct 11, 2018

Extracting NetNTLM without touching lsass.exe

C++ 233 32 Updated Nov 27, 2023

Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)

C++ 61 9 Updated Sep 29, 2024

Enhanced version of the classic Spy++ tool

C++ 179 50 Updated Mar 26, 2024

COM ViewLogger — new malware keylogging technique

C++ 304 48 Updated Jan 6, 2025

This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.

C 482 70 Updated Dec 11, 2024

Reverse engineering winapi function loadlibrary.

C++ 80 12 Updated Apr 17, 2023

Process Injection: APC Injection

Assembly 29 14 Updated Jan 13, 2021

This repo contains some Amsi Bypass methods i found on different Blog Posts.

1,793 295 Updated Nov 28, 2024

A tool that shows detailed information about named pipes in Windows

C# 579 50 Updated Nov 15, 2024

A lightweight YouTube client for Linux, without requiring an API key.

Perl 419 18 Updated Jan 21, 2025

FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading

Rust 233 24 Updated Sep 26, 2024

Creates a proxy dll which sits between the game and original dll

C++ 124 37 Updated Mar 26, 2024

Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.

C++ 853 180 Updated Nov 21, 2019

Run a program as TrustedInstaller (SYSTEM)

Visual Basic 6.0 111 13 Updated Sep 14, 2024

PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.

C 573 62 Updated Sep 26, 2023

A collection of tools, source code, and papers researching Windows' implementation of CET.

C 79 16 Updated Oct 6, 2020

Detect strange memory regions and DLLs

C++ 174 38 Updated Jan 20, 2022

Finding Truth in the Shadows

C++ 88 8 Updated Jan 26, 2023

A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.

Python 504 72 Updated Aug 1, 2022

You shall pass

PowerShell 252 51 Updated Jul 16, 2022
Next
Showing results