Starred repositories
Share a single keyboard and mouse between multiple computers.
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
PoC Implementation of a fully dynamic call stack spoofer
Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.
This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp, socket)
UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware
Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime
Bypass Credential Guard by patching WDigest.dll using only NTAPI functions
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess.
early cascade injection PoC based on Outflanks blog post
StoneKeeper C2, an experimental EDR evasion framework for research purposes
Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, and reverting back memory protections and original memory state
Comprehensive Windows Syscall Extraction & Analysis Framework
Impersonate Tokens using only NTAPI functions
DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly
Instantly suspend processes to bypass kernel driver protections.
A simple C++ Windows program search for a string in all the registry hives.