Saturday, September 21, 2019
Home Tags Dll Hijack Techniques

Tag: dll Hijack Techniques

Must Need

Memguard : Secure Software Enclave For Storage Of Sensitive Information In Memory

Memguard : Secure Software Enclave For Storage Of Sensitive Information In...

MemGuard secure software enclave for storage of sensitive information in memory. This package attempts to reduce the likelihood of sensitive data being...
CyberChef

CyberChef – A web App For Encryption, Encoding, Compression & Data...

CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These operations include simple encoding...
Remot 3d

Remot3d – A Simple Tool Created For Large Pentesters

Remot 3d is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a...
JWT Tool : A Toolkit For Testing, Tweaking & Cracking JSON Web Tokens

JWT Tool : A Toolkit For Testing, Tweaking & Cracking JSON...

JWT Tool(jwt_tool.py) is a toolkit for validating, forging and cracking JWTs (JSON Web Tokens). Its functionality includes: Checking the...
Hooker

Hooker : Automated Dynamic Analysis of Android Applications

Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently...
Volatility Framework

Volatility Framework – Volatile memory extraction utility framework

The Volatility Framework is a totally open accumulation of tools, executed in Python under the GNU General Public License, for the extraction of computerized...
UDP2Raw Tunnel

UDP2Raw Tunnel – A Tunnel which Turns UDP Traffic into Encrypted...

Udp2raw Tunnel is a tunnel which turns UDP Traffic into Encrypted FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls(or Unstable UDP...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout