A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system
☆44Oct 30, 2024Updated last year
Alternatives and similar repositories for T-70
Users that are interested in T-70 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆37Oct 30, 2024Updated last year
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated last year
- Vectored Exception Handling Squared☆31Dec 27, 2025Updated 3 months ago
- ☆60Oct 24, 2024Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Stage 0☆168Dec 18, 2024Updated last year
- Sleep obfuscation☆272Dec 13, 2024Updated last year
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 4 months ago
- BOF with Synthetic Stackframe☆240Oct 30, 2025Updated 5 months ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆53Mar 16, 2026Updated last month
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 2 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆347Oct 7, 2024Updated last year
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 7 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Mythic Agent written in PIC C.☆203Feb 4, 2025Updated last year
- ☆53Oct 29, 2024Updated last year
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆150Apr 18, 2025Updated 11 months ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆40Aug 5, 2025Updated 8 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆108Oct 29, 2024Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆191Jan 17, 2026Updated 2 months ago
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆59Jan 29, 2015Updated 11 years ago
- ☆37Nov 8, 2024Updated last year
- 64-bit, position-independent implant template for Windows in Rust.☆180Nov 28, 2025Updated 4 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Jul 6, 2025Updated 9 months ago