wyrover's repositories
hooking-by-example
A series of increasingly complex programs demonstrating function hooking on 64 bit Windows. Culminating in a program that hooks mspaint to make it always paint orange.
auto-trading-support-tools
Linux+Wine+MetaTrader 構成の自動売買サーバー運用をサポートするツール群
CallObfuscator
Obfuscate specific windows apis with different apis
cmake-init
The missing CMake project initializer
cobalt-arsenal
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
CobaltstrikeSource
Cobaltstrike4.1 Source
CrossC2
generate CobaltStrike's cross-platform payload
Ctpapi
Python-CTPAPI-v6.3.19穿透式监管版本CTP接口的Python封装
EASY-HWID-SPOOFER
基于内核模式的硬件信息欺骗工具
FX-Data-Convert-Action
:chart_with_upwards_trend:🐳Converts Forex historical data to different formats via GitHub Actions
goscon
stable connection
javascript-obfuscator
A powerful obfuscator for JavaScript and Node.js
Limelighter
A tool for generating fake code signing certificates or signing real ones
MicroBackdoor
Small and convenient C2 tool for Windows targets
mitmproxy-hub
mitmproxy非常适合捕捉网络流量,但是对于Java用户没有简单的接口。软件测试社区,特别是爬虫、中间人攻击测试人员,希望能够捕获设备在Java/golang/c++测试期间发出的网络请求。为此,基于grpc开发了mitmproxy的**服务,任何语言都可以基于mitm_hub.proto实现的回调定义生成自己的远程客户端代码。以便在你的语言环境上也能像在python本地一样,使用remotemitmproxy。
mutagen
Fast file synchronization and network forwarding for remote development
r77-rootkit
Ring 3 rootkit with single file installer and fileless persistence that hides processes, files, network connections, etc.
RmlUi
RmlUi - The HTML/CSS User Interface library evolved
ScyllaHide-IDA7.5
ScyllaHide for IDA7.5; ScyllaHide IDA7.5; It is a really niccccccce anti-anti-debug tool
SocksOverRDP
Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop
soldat
Soldat is a unique 2D (side-view) multiplayer action game
superproxy
基于golang协程实现的超级代理,真正优雅使用代理池
tdxchanbi
通达信实现缠论K线合并、分型识别、笔识别和画笔
tomlplusplus
Header-only TOML config file parser and serializer for C++17 (and later!).
TraceON
A x32Dbg (so far doesn't work on x64DbG) Plugin that single steps through the instructions and stops the trace at once when the Instruction pointer is outside any known DLL memory region. Can be used to detect Self injected PE/ dump out shellcode from memory. Works slower than expected.
UnhookMe
UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware