LYingSiMon's repositories
AsyncRAT-C-Sharp
Open-Source Remote Administration Tool For Windows C# (RAT)
byob
An open-source post-exploitation framework for students, researchers and developers.
BypassAntiVirus
远控免杀系列文章及配套工具,汇总测试了互联网上的几十种免杀工具、113种白名单免杀方式、8种代码编译免杀、若干免杀实战技术,并对免杀效果进行了一一测试,为远控的免杀和杀软对抗免杀提供参考。
ClearDriverTraces
clearing traces of a loaded driver
cppcryptfs
cppcryptfs is an implementation of the gocryptfs encrypted overlay filesystem in C++ for Windows.
cvui
A (very) simple UI lib built on top of OpenCV drawing primitives
DbgShell
A PowerShell front-end for the Windows debugger engine.
DebugViewPP
DebugView++, collects, views, filters your application logs, and highlights information that is important to you!
GoodbyeDPI
GoodbyeDPI — Deep Packet Inspection circumvention utility (for Windows)
Hwid--Spoofer
🔵 EAC - BE / Kernel Driver 🔵
inline_syscall
Inline syscalls made easy for windows on clang
kiero
Universal graphical hook for a D3D9-D3D12, OpenGL and Vulkan based games.
lazy_importer
library for importing functions from dlls in a hidden, reverse engineer unfriendly way
NIM_Duilib_Framework
网易云信Windows应用开发框架。
NtCall64
Windows NT x64 syscall fuzzer
opencv_tutorials
Opencv4.0 with python (English&中文), and will keep the update ! 👊
PoC-in-GitHub
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
process_doppelganging
My implementation of enSilo's Process Doppelganging (PE injection technique)
RabbitIm
(类似qq)玉兔即时通讯。开源的跨平台的的即时通信系统。包括文本、音视频、白板、远程控制
RebirthGuard
Anti-cheat library for Windows C++
SandboxBootkit
Bootkit for Windows Sandbox to disable DSE/PatchGuard.
Sandboxie
Sandboxie - Open Source
Shell_Protect
VM一键加壳/脱壳,全压缩,反调试等
SystemExplorer
Windows System Explorer
TrojanCockroach
A Stealthy Trojan Spyware
VMProtect-devirtualization
Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM.
voltron
A hacky debugger UI for hackers
vt-debuuger
a debugger use vt technology
yapi
💉 全能进程注入器 [Yet Another Process Injector] that reduce differences between x64, wow64 and x86 processes.