BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).
☆684Apr 12, 2026Updated last week
Alternatives and similar repositories for BYOVD
Users that are interested in BYOVD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CPP AV/EDR Killer☆480Nov 28, 2023Updated 2 years ago
- ROP-based sleep obfuscation to evade memory scanners☆381Jun 22, 2025Updated 10 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- bring your own vulnerable driver☆118May 17, 2023Updated 2 years ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆164Oct 31, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- yet another AV killer tool using BYOVD☆311Dec 12, 2023Updated 2 years ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆301Jul 31, 2024Updated last year
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆547Feb 13, 2024Updated 2 years ago
- Some Rust program I wrote while learning Malware Development☆161Feb 4, 2025Updated last year
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆264Jun 29, 2024Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆445Dec 21, 2023Updated 2 years ago
- Remove AV/EDR Kernel ObRegisterCallbacks、CmRegisterCallback、MiniFilter Callback、PsSetCreateProcessNotifyRoutine Callback、PsSetCreateThrea…☆1,311Jun 21, 2024Updated last year
- kill anti-malware protected processes ( BYOVD )☆973Jul 21, 2023Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆790Jan 26, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Bypass LSA protection using the BYODLL technique☆178Sep 21, 2024Updated last year
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆722Jul 19, 2023Updated 2 years ago
- ☆411Dec 8, 2024Updated last year
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆266Oct 16, 2024Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆622Jan 2, 2025Updated last year
- HookChain: A new perspective for Bypassing EDR Solutions☆598Jan 5, 2025Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆376Apr 19, 2023Updated 3 years ago
- Use hardware breakpoint to dynamically change SSN in run-time☆280Apr 10, 2024Updated 2 years ago
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆324Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆465Aug 2, 2024Updated last year
- Generic PE loader for fast prototyping evasion techniques☆245Jul 2, 2024Updated last year
- A small x64 library to load dll's into memory.☆462Nov 6, 2023Updated 2 years ago
- Call stack spoofing for Rust☆361Feb 7, 2025Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆226Jul 25, 2023Updated 2 years ago
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆45Jan 9, 2025Updated last year
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆264Aug 31, 2025Updated 7 months ago
- A BOF that runs unmanaged PEs inline☆694Oct 23, 2024Updated last year
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,256Dec 11, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆101Mar 20, 2023Updated 3 years ago
- Call Stack Spoofing for Rust☆214Jan 28, 2026Updated 2 months ago
- Process injection alternative☆407Sep 6, 2024Updated last year
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆66Mar 1, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post☆241Nov 7, 2024Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,856Nov 3, 2024Updated last year
- BOF with Synthetic Stackframe☆240Oct 30, 2025Updated 5 months ago