C5Hackr / Segment-Encryption
☆13Updated last month
Related projects: ⓘ
- ☆22Updated last year
- IAT-Obfuscation to make static analysis of executable harder.☆41Updated 3 years ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 3 years ago
- ☆29Updated 2 months ago
- BEDaisy.sys report bypass☆28Updated 11 months ago
- ☆15Updated this week
- ☆21Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated last year
- ☆21Updated last year
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆27Updated 2 months ago
- Rookit and anti rookit on Windows platform☆10Updated 4 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆36Updated 6 months ago
- manual mapping injector☆25Updated 2 years ago
- An attempt at reversing WindowsDefender☆19Updated 5 months ago
- ☆23Updated this week
- Dynamically generated obfuscated jumps and/or function calls☆33Updated last year
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆38Updated 3 months ago
- Change hash for a signed pe☆15Updated last year
- Bypassing kernel patch protection runtime☆19Updated last year
- 💻 Windows 10 Kernel-mode rootkit☆30Updated 2 years ago
- Compile-Time Calls Obfuscator for C++14+☆32Updated 9 months ago
- using the Recycle Bin to insure persistence☆11Updated 2 years ago
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 2 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆18Updated 3 years ago
- December 2023 BattlEye shellcode dump☆26Updated 8 months ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆10Updated 3 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated last year
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆39Updated last year
- Enumerate Callbacks and all Object Types☆13Updated last year
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆15Updated last month