8000 wietze (Wietze) · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View wietze's full-sized avatar

Organizations

@LOLBAS-Project

Block or report wietze

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. HijackLibs HijackLibs Public

    Project for tracking publicly disclosed DLL Hijacking opportunities.

    763 97

  2. ArgFuscator.net ArgFuscator.net Public

    ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native executables.

    TypeScript 258 31

  3. windows-dll-env-hijacking windows-dll-env-hijacking Public

    Project for identifying executables and DLLs vulnerable to environment-variable based DLL hijacking.

    Shell 58 7

  4. Invoke-ArgFuscator Invoke-ArgFuscator Public

    Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-native executables.

    PowerShell 175 31

  5. windows-dll-hijacking windows-dll-hijacking Public

    Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.

    Python 470 77

  6. windows-command-line-obfuscation windows-command-line-obfuscation Public

    Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.

    Python 174 24

0