The PoC for CVE-2025-70795 / CVE-2026-0828 and its update
☆41Feb 16, 2026Updated 3 weeks ago
Alternatives and similar repositories for STProcessMonitorBYOVD
Users that are interested in STProcessMonitorBYOVD are comparing it to the libraries listed below
Sorting:
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 5 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 7 months ago
- Deserialization payload generator for a variety of .NET formatters☆176Dec 2, 2025Updated 3 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆71Dec 26, 2025Updated 2 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- Source code for the DEF CON 33 CTF Finals.☆26Aug 26, 2025Updated 6 months ago
- Overview of MS Defender☆108Feb 20, 2026Updated 2 weeks ago
- Integer overflow in FreeType software, which also affects Chrome☆28Aug 27, 2025Updated 6 months ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- ☆28Feb 11, 2026Updated 3 weeks ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- XillenStealer V4.0 - Professional cross-platform Python stealer builder with modern UI and comprehensive features. V5.0 - t.me/XillenStea…☆54Feb 23, 2026Updated 2 weeks ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- Local Privilege Escalation Affecting Millions of Gaming Laptops☆61Jan 19, 2026Updated last month
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆48Updated this week
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆111Feb 15, 2026Updated 3 weeks ago
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆80Aug 3, 2025Updated 7 months ago
- A tool combining DWARF info and source to search for kernel heap objects☆24Dec 23, 2025Updated 2 months ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- 一款简单的后渗透免杀加载器,Bypass AV/EDR☆92Oct 26, 2024Updated last year
- Utilities for obfuscating shellcode☆101Updated this week
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆29Oct 2, 2024Updated last year
- ☆21Apr 6, 2025Updated 11 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 9 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 7 months ago
- proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.☆53Dec 9, 2025Updated 3 months ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆143Feb 14, 2026Updated 3 weeks ago
- The Azure Execution Tool☆135Feb 6, 2026Updated last month
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Exploitation of CVE-2026-24061☆197Jan 22, 2026Updated last month
- User-mode implementation of HTTP.SYS. Implements HTTP 1.1 of the "HTTP Server API 2.0" for web servers☆45Feb 17, 2025Updated last year
- Simple C++ PoC of SeDebugPrivilege Privesc☆30Feb 12, 2024Updated 2 years ago
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆240Feb 20, 2026Updated 2 weeks ago
- ☆76Jul 12, 2025Updated 7 months ago