ColeHouston / Sunder
Windows rootkit designed to work with BYOVD exploits
☆145Updated last week
Alternatives and similar repositories for Sunder:
Users that are interested in Sunder are comparing it to the libraries listed below
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆219Updated 4 months ago
- Sleep obfuscation☆206Updated last month
- A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls☆105Updated 4 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆96Updated 10 months ago
- "Service-less" driver loading☆150Updated 2 months ago
- A Mythic Agent written in PIC C.☆171Updated 2 weeks ago
- 32bit MIPS I VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆105Updated last month
- Bypass LSA protection using the BYODLL technique☆154Updated 4 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆84Updated 7 months ago
- A cmkr based win32 shellcode template for a unified build platform and more production friendly structure/testing.☆66Updated 2 months ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆125Updated 5 months ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆131Updated 8 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆89Updated 10 months ago
- ☆120Updated last year
- A collection of position independent coding resources☆64Updated last week
- A set of programs for analyzing common vulnerabilities in COM☆165Updated 4 months ago
- Generic PE loader for fast prototyping evasion techniques☆191Updated 6 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆159Updated last month
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆169Updated 2 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆233Updated 5 months ago
- BOF with Synthetic Stackframe☆103Updated this week
- ☆122Updated 4 months ago
- 64-bit, position-independent implant template for Windows in Rust.☆108Updated 3 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆152Updated 8 months ago
- Activation Context Hijack☆142Updated 2 months ago
- ☆134Updated last year
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆181Updated 3 months ago
- ☆137Updated last month
- ☆137Updated 6 months ago
- ☆104Updated 3 months ago