Skip to content
View Swifto0's full-sized avatar
🌻
🌻

Block or report Swifto0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
70 stars written in C
Clear filter

Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

C 718 102 Updated May 23, 2025

Aims to identify sleeping beacons

C 634 60 Updated Dec 9, 2024

Quickly debug shellcode extracted during malware analysis

C 614 87 Updated May 23, 2023

PIC lsass dumper using cloned handles

C 595 106 Updated Oct 18, 2022

A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.

C 587 67 Updated Jan 2, 2025

The Grimoire Hypervisor solution for x86 Processors with experimental nested virtualization support. Remastering with Rust in progress.

C 578 93 Updated Nov 1, 2025

绕3环的shellcode免杀框架

C 574 155 Updated Mar 19, 2021

C++ self-Injecting dropper based on various EDR evasion techniques.

C 414 71 Updated Feb 11, 2024

Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do

C 397 53 Updated Feb 6, 2023

Encrypted shellcode Injection to avoid Kernel triggered memory scans

C 394 41 Updated Sep 12, 2023

A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC

C 371 57 Updated May 24, 2022

A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.

C 359 46 Updated Feb 10, 2025

Emulate Drivers in RING3 with self context mapping or unicorn

C 353 105 Updated Aug 18, 2022

OffensivePH - use old Process Hacker driver to bypass several user-mode access controls

C 336 42 Updated Oct 9, 2021

nginx WebShell/内存马,更优雅的nignx backdoor

C 318 42 Updated Jan 4, 2024

RPC远程主机信息匿名扫描工具

C 318 42 Updated Sep 30, 2022

miscellaneous scripts and programs

C 260 68 Updated Jan 23, 2025

This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.

C 258 33 Updated Apr 29, 2023

Modules used by the Havoc Framework

C 252 65 Updated Jun 17, 2024

Execute shellcode from a remote-hosted bin file using Winhttp.

C 237 47 Updated Jun 22, 2023

POC tool to convert CobaltStrike BOF files to raw shellcode

C 216 28 Updated Nov 5, 2021

Exploitation of process killer drivers

C 200 27 Updated Oct 17, 2023

Proof of Concepts code for Bring Your Own Vulnerable Driver techniques

C 195 28 Updated Aug 21, 2025

关于RPC一些绕EDR的tips

C 193 46 Updated Mar 3, 2023

远程创建任务计划工具

C 189 20 Updated Apr 23, 2022

Hide process,port,self under Linux using the ld_preload

C 174 53 Updated Nov 18, 2021

Run Processes as PPL with ELAM

C 172 31 Updated Mar 17, 2022

A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass

C 161 19 Updated Sep 22, 2025

WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler

C 130 26 Updated Jul 21, 2025