Lists (7)
Sort Name ascending (A-Z)
Stars
Collection of various algorithms in mathematics, machine learning, computer science, physics, etc implemented in C for educational purposes.
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals…
The Minimalistic x86/x64 API Hooking Library for Windows
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
Situational Awareness commands implemented using Beacon Object Files
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.
Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods & tokens from Chrome, Edge, Brave & Avast - fileless, user-…
Dump cookies and credentials directly from Chrome/Edge process memory
A modern 32/64-bit position independent implant template
Public open-source code of malware Stuxnet (aka MyRTUs).
BOF to steal browser cookies & credentials
Malware Development for Ethical Hackers, published by Packt
Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.
Hide Process From Task Manager using Usermode API Hooking
LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.
C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automation.
Slides & Code snippets for a workshop held @ x33fcon 2024
The code is a pingback to the Dark Vortex blog: https://0xdarkvortex.dev/hiding-memory-allocations-from-mdatp-etwti-stack-tracing/