Cracked5pider / kaine-assembly
a demo module for the kaine agent to execute and inject assembly modules
☆37Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for kaine-assembly
- Reimplementation of the KExecDD DSE bypass technique.☆42Updated 2 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆57Updated 8 months ago
- stack spoofing☆53Updated this week
- ☆20Updated 3 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆49Updated last week
- ☆96Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆39Updated 11 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆46Updated last month
- A process injection technique using only thread context manipulation☆23Updated 11 months ago
- Threadless shellcode injection tool☆60Updated 3 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆38Updated 10 months ago
- 64-bit, position-independent reverse tcp shell, built in Rust for Windows.☆44Updated last month
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆38Updated 4 months ago
- Heap encryption in Nim☆19Updated 2 months ago
- A work in progress BOF/COFF loader in Rust☆45Updated last year
- TypeLib persistence technique☆75Updated 3 weeks ago
- Section-based payload obfuscation technique for x64☆58Updated 3 months ago
- ☆81Updated 3 months ago
- ☆44Updated 2 years ago
- Host CLR and run .NET binaries using Rust☆60Updated 2 weeks ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆55Updated last year
- BOF for C2 framework☆40Updated last week
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆34Updated 3 months ago
- In-memory hiding technique☆42Updated 5 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆23Updated 2 months ago
- ☆35Updated last year
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆42Updated 8 months ago
- Sleep Obfuscation☆41Updated 2 years ago