CyberSecurityUP / Probabilistic-Call-Stack-PoCView external linksLinks
A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-based detection research, and evasion analysis.
☆23Jan 17, 2026Updated 3 weeks ago
Alternatives and similar repositories for Probabilistic-Call-Stack-PoC
Users that are interested in Probabilistic-Call-Stack-PoC are comparing it to the libraries listed below
Sorting:
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 7 months ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- ☆18Sep 1, 2025Updated 5 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆57Jun 15, 2025Updated 8 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 6 months ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆10Jan 4, 2025Updated last year
- ☆47Dec 5, 2025Updated 2 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆102Jan 29, 2026Updated 2 weeks ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- ☆33Mar 19, 2025Updated 10 months ago
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 4 months ago
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated 11 months ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- Obsidian Vault for my Cybersecurity learning☆11Oct 20, 2024Updated last year
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- x64 version☆36Oct 8, 2021Updated 4 years ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆50May 5, 2025Updated 9 months ago
- Random BOFs for LDAP tradecraft☆72Sep 9, 2025Updated 5 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- ☆42Sep 28, 2024Updated last year
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 3 years ago
- ☆24Jul 27, 2024Updated last year
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆10Nov 25, 2025Updated 2 months ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- A public repo to hold some code review challenges for RSA Conference 2022☆11Jun 3, 2022Updated 3 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆63Apr 2, 2025Updated 10 months ago
- Attacking the cleanup_module function of a kernel module☆57Jun 30, 2025Updated 7 months ago
- A light weight x86 32bit kernel☆24Dec 5, 2025Updated 2 months ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- ☆15May 30, 2025Updated 8 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Pure Rust implementations of static Diffie-Hellman (and static elliptic-curve DH) key-exchange☆13Jan 12, 2021Updated 5 years ago
- ☆13Apr 29, 2025Updated 9 months ago