Cracked5pider / RhaastLinks
doesnt work and wont work on it anymore
☆9Updated last year
Alternatives and similar repositories for Rhaast
Users that are interested in Rhaast are comparing it to the libraries listed below
Sorting:
- Beacon Debugger☆40Updated 9 months ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆26Updated last year
- ☆34Updated 2 months ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated last year
- Repo that holds random POCs☆51Updated last year
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆48Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆38Updated 2 years ago
- In-memory hiding technique☆56Updated 7 months ago
- ☆22Updated last year
- A synergized Visual Studio and Rust development environment☆19Updated 6 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆72Updated 8 months ago
- BYOVD collection☆23Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆54Updated last year
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆34Updated 3 months ago
- Plantronics Desktop Hub LPE☆36Updated last year
- ☆56Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆49Updated 6 months ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆81Updated this week
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆57Updated 5 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆39Updated 11 months ago
- ☆100Updated last year
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆17Updated 4 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Updated 11 months ago
- ☆20Updated 6 months ago
- Shellcode capable of bypassing EAF / IAF mitigations☆20Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆44Updated 6 months ago
- ☆41Updated 5 months ago
- ☆39Updated last year