Skip to content
View CDipper's full-sized avatar

Block or report CDipper

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
42 stars written in C
Clear filter

windows-kernel-exploits Windows平台提权漏洞集合

C 8,553 2,869 Updated Jun 11, 2021

Defeating Windows User Account Control

C 7,214 1,406 Updated Dec 14, 2025

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

C 3,176 818 Updated Sep 3, 2022

HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

C 2,908 574 Updated Feb 24, 2025

generate CobaltStrike's cross-platform payload

C 2,523 373 Updated Nov 20, 2023

Abusing impersonation privileges through the "Printer Bug"

C 2,149 364 Updated Sep 10, 2020

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

C 2,137 296 Updated Aug 15, 2024

Situational Awareness commands implemented using Beacon Object Files

C 1,655 271 Updated Nov 24, 2025

Fileless lateral movement tool that relies on ChangeServiceConfigA to run command

C 1,571 257 Updated Jul 10, 2023

A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

C 1,392 268 Updated Nov 22, 2023

Cobalt Strike UDRL for memory scanner evasion.

C 993 173 Updated Jun 4, 2024

Sleep Obfuscation

C 808 112 Updated Dec 3, 2023

InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditiona…

C 723 137 Updated Jul 22, 2023

Execute unmanaged Windows executables in CobaltStrike Beacons

C 713 106 Updated Mar 4, 2023

A way to delete a locked file, or current running executable, on disk.

C 612 101 Updated Nov 5, 2025

Simulate the behavior of AV/EDR for malware development training.

C 556 51 Updated Feb 15, 2024

KaynLdr is a Reflective Loader written in C/ASM

C 556 112 Updated Dec 3, 2023

An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.

C 483 65 Updated Dec 7, 2025

BOF to steal browser cookies & credentials

C 482 42 Updated Dec 17, 2025

SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…

C 411 62 Updated Nov 3, 2025

A Visual Studio template used to create Cobalt Strike BOFs

C 323 55 Updated Nov 17, 2021

Research on Windows Kernel Executive Callback Objects

C 312 70 Updated Feb 22, 2020

Obex – Blocking unwanted DLLs in user mode

C 277 36 Updated Sep 18, 2025

Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for security professionals and enthusiasts.

C 257 48 Updated Mar 13, 2024

Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven

C 251 35 Updated Oct 16, 2024

Generic PE loader for fast prototyping evasion techniques

C 242 52 Updated Jul 2, 2024
Next