Skip to content
View Iconabc's full-sized avatar
😀
😀

Block or report Iconabc

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode

PowerShell 2,496 500 Updated Nov 15, 2023

A post exploitation framework designed to operate covertly on heavily monitored environments

C 2,169 336 Updated Sep 29, 2021

SysWhispers on Steroids - AV/EDR evasion via direct system calls.

Python 1,585 199 Updated Jul 31, 2024

A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

C 1,399 270 Updated Nov 22, 2023

CTF Archives: Collection of CTF Challenges.

Python 1,359 187 Updated Feb 8, 2026

Multilayered AV/EDR Evasion Framework

C++ 892 140 Updated Sep 6, 2025

Loads any C# binary in mem, patching AMSI + ETW.

C# 838 149 Updated Oct 3, 2021

A cross platform C2/post-exploitation framework.

Rust 706 224 Updated Oct 8, 2022

Cobalt Strike random C2 Profile generator

Python 685 89 Updated Jan 5, 2023

寻找可利用的白文件

C++ 556 69 Updated Aug 18, 2025

This is the tool to dump the LSASS process on modern Windows 11

C++ 555 67 Updated Nov 1, 2025

A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.

Python 536 77 Updated Aug 1, 2022

An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.

C 490 68 Updated Dec 7, 2025

Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind

C 482 82 Updated Jul 12, 2023

A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk

C 474 64 Updated Jul 6, 2024

A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes.

C++ 465 83 Updated Aug 23, 2023

SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…

C 432 65 Updated Nov 3, 2025

Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence

Python 421 74 Updated Nov 7, 2025

A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.

C 408 56 Updated Jan 11, 2026

Evasive shellcode loader

C++ 398 66 Updated Oct 17, 2024

A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAPI for various operations.

Rust 355 33 Updated Apr 26, 2025

My collection of malware dev links

Python 308 35 Updated Feb 9, 2026

Replace the .txt section of the current loaded modules from \KnownDlls\

C 305 41 Updated Sep 28, 2022

针对PE文件的分离的攻防对抗工具,红队、研究者的好帮手。目前支持文件头伪装、证书区段感染。A no-kill confrontation tool for the separation of PE files, a good helper for red teams and researchers. Currently, file header spoofing and certificat…

Go 287 32 Updated Aug 20, 2024

RunPE implementation with multiple evasive techniques (2)

C 269 35 Updated Sep 25, 2025

The code is a pingback to the Dark Vortex blog: https://0xdarkvortex.dev/hiding-memory-allocations-from-mdatp-etwti-stack-tracing/

C 209 41 Updated Jan 29, 2023

基于Tinynuke修复得到的HVNC

C 188 59 Updated Sep 4, 2021

C++ Header only string obfuscator library using metaprogramming. Affine Cipher technique is used for encryption and decryption.

C++ 179 33 Updated Dec 11, 2019

Build sneaky & malicious LNK files.

C# 159 15 Updated Jul 16, 2025

Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)

C++ 144 20 Updated Mar 16, 2024
Next