Skip to content
View nicelnicel's full-sized avatar

Block or report nicelnicel

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
223 stars written in C
Clear filter

Debugger Anti-Detection Benchmark

C 372 48 Updated Aug 11, 2025

Module extending manual mapper

C 362 102 Updated Mar 28, 2020

A more stealthy variant of "DLL hollowing"

C 357 59 Updated Mar 8, 2024

It's a minifilter used for transparent-encrypting.

C 335 164 Updated Jul 28, 2025

PVE Debain Ubuntu ArchLinux virtual machine emulates a physical machine to avoid(or anti) detection(pve Debian Ubuntu ArchLinux虚拟机模拟真实机器防检测)

C 332 69 Updated Oct 22, 2025

远程shellcode加载&权限维持+小功能

C 301 64 Updated May 7, 2024

Hide Driver By MiProcessLoaderEntry

C 292 144 Updated May 17, 2019

PoC memory injection detection agent based on ETW, for offensive and defensive research purposes

C 291 45 Updated Apr 10, 2021

Win32k LPE vulnerability used in APT attack

C 290 176 Updated Dec 18, 2017

Process Injection using Thread Name

C 281 37 Updated Apr 18, 2025

Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process

C 280 46 Updated Jan 21, 2024

This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.

C 276 52 Updated Aug 4, 2021

Small x86-32/x64 FTP Server

C 271 89 Updated Nov 8, 2025

Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities) to load a unsigned driver

C 262 144 Updated Oct 2, 2021

Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread

C 246 21 Updated Aug 31, 2025

ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports payload-side

C 225 58 Updated Mar 22, 2023

modify from memorymodule. support exception

C 220 97 Updated Oct 22, 2020

Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL

C 218 68 Updated Nov 12, 2020

x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code

C 208 35 Updated May 27, 2021

Proof of Concepts code for Bring Your Own Vulnerable Driver techniques

C 195 28 Updated Aug 21, 2025

Source from VMDE paper, adapted to 2015

C 189 64 Updated Dec 18, 2017

CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator.

C 183 31 Updated Jan 3, 2024

免杀主流防病毒软件

C 182 23 Updated Oct 22, 2025

一个用来做windows内核hook的框架

C 181 44 Updated Apr 29, 2025

轻量级VT框架和Ept无痕HOOK,测试环境:WIN10 1903,WIN7

C 174 65 Updated Oct 28, 2022
C 174 69 Updated Oct 2, 2024

ZeroAccess v3 toolkit

C 165 103 Updated Dec 18, 2017

Expand compressed files from WinSxS folder

C 165 42 Updated Jul 11, 2025

KDP compatible unsigned driver loader leveraging a write primitive in one of the IOCTLs of gdrv.sys

C 161 35 Updated Jun 14, 2024