Skip to content
View d5fa4lt's full-sized avatar
🧩
Working
🧩
Working

Block or report d5fa4lt

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
27 stars written in C
Clear filter

The pattern matching swiss knife

C 9,381 1,548 Updated Nov 26, 2025

Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

C 4,443 731 Updated Jul 8, 2025

A beacon object file implementation of PoolParty Process Injection Technique.

C 432 50 Updated Dec 21, 2023

AdaptixFramework Extension Kit

C 400 116 Updated Jan 31, 2026

Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework

C 389 46 Updated Jul 30, 2024

RunPE implementation with multiple evasive techniques (1)

C 379 50 Updated Sep 22, 2023

Evasion kit for Cobalt Strike

C 377 46 Updated Jan 17, 2026

RunPE implementation with multiple evasive techniques (2)

C 268 35 Updated Sep 25, 2025

Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows Filtering Platform (WFP).

C 257 34 Updated Sep 23, 2025

Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven

C 252 41 Updated Oct 16, 2024

Reflective shellcode loaderwith advanced call stack spoofing and .NET support.

C 225 46 Updated Sep 19, 2025

Proof of Concepts code for Bring Your Own Vulnerable Driver techniques

C 204 29 Updated Aug 21, 2025

Enumerate active EDR's on the system

C 150 26 Updated Sep 23, 2025

Modern PIC implant for Windows (64 & 32 bit)

C 105 13 Updated Jul 23, 2025

Crystal Palace library for proxying Nt API calls via the Threadpool

C 97 12 Updated Oct 18, 2025

Alternative Read and Write primitives using Rtl* functions the unintended way.

C 78 10 Updated Aug 25, 2025

A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).

C 68 10 Updated Dec 17, 2025

A Crystal Palace shared library to resolve & perform syscalls

C 56 6 Updated Oct 29, 2025

Evasive shellcode loader for Red Teaming

C 17 Updated Aug 15, 2025

A single byte modification in the kernel memory bypasses and disables all core functions of the AV/EDR security solutions

C 15 Updated Aug 26, 2025

C2 frameworks for RTO, server and implants for stealth red-teaming mode.

C 13 Updated Sep 11, 2024

P2P Mesh C2 framework (C implants + Python server + Dashboard) for resilient red‑team ops

C 12 Updated Aug 22, 2025

Direct syscalls Injection to bypass AV/EDR

C 12 3 Updated May 18, 2024

Process Injection Techniques using DIrect and Indirect Syscalls

C 10 Updated Dec 6, 2024