Skip to content
View kapiushion's full-sized avatar

Block or report kapiushion

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

290 stars written in C
Clear filter

Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR hooks in Windows.

C 287 34 Updated Jul 31, 2024

Cobalt Strike BOF for evasive .NET assembly execution

C 285 36 Updated Mar 31, 2025

CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking

C 284 37 Updated Jun 8, 2023

Cybersecurity research results. Simple C/C++ and Python implementations

C 278 63 Updated Nov 3, 2025

Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.

C 277 40 Updated Apr 6, 2025

Reaping treasures from strings in remote processes memory

C 274 21 Updated Feb 8, 2025

EDRSandblast-GodFault

C 268 50 Updated Aug 28, 2023

Native Syscalls Shellcode Injector

C 267 44 Updated Jul 2, 2023

Obex – Blocking unwanted DLLs in user mode

C 262 35 Updated Sep 18, 2025

Generate FUD backdoors

C 262 53 Updated Mar 17, 2023

Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.

C 260 34 Updated Apr 17, 2023

Admin to Kernel code execution using the KSecDD driver

C 260 43 Updated Apr 19, 2024

This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.

C 259 33 Updated Apr 29, 2023

RISC-V Virtual Machine

C 255 215 Updated Jun 10, 2025

Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for security professionals and enthusiasts.

C 251 48 Updated Mar 13, 2024

Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows Filtering Platform (WFP).

C 251 34 Updated Sep 23, 2025

Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.

C 248 27 Updated Jun 11, 2024

Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread

C 247 21 Updated Aug 31, 2025

Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijack execution flow with very detailed explanation.

C 245 38 Updated Oct 31, 2024

Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven

C 245 34 Updated Oct 16, 2024

VirtualBox Git mirror

C 244 79 Updated Sep 28, 2024

Reflective DLL Injection Made Bella

C 243 47 Updated Jan 6, 2025

CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process injection, persistence and more, leveraging direct syscalls (SysWh…

C 242 34 Updated Jan 4, 2023

Generic PE loader for fast prototyping evasion techniques

C 239 48 Updated Jul 2, 2024

RunPE implementation with multiple evasive techniques

C 239 34 Updated Sep 25, 2025

This is a simple example and explanation of obfuscating API resolution via hashing

C 238 37 Updated May 25, 2020

A shell for Windows Native Mode

C 233 46 Updated Feb 3, 2025

Zipper, a CobaltStrike file and folder compression utility.

C 225 49 Updated Jan 18, 2020

transform your payload into ipv4/ipv6/mac arrays

C 224 34 Updated Aug 18, 2022