Error996 / bdvl
bdvl
☆113Updated 3 years ago
Alternatives and similar repositories for bdvl:
Users that are interested in bdvl are comparing it to the libraries listed below
- ☆148Updated 4 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆67Updated 6 years ago
- Move CS beacon to GPU memory when sleeping☆244Updated 3 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆181Updated 7 years ago
- Shellcoding utilities☆221Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆260Updated 3 years ago
- Proxy Unix applications in the terminal☆114Updated 3 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆167Updated 3 years ago
- Example code for EDR bypassing☆150Updated 6 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- Domain Borrowing PoC☆212Updated 3 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆149Updated 4 years ago
- ☆167Updated 3 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆222Updated last year
- Go implementation of the Heaven's Gate technique☆97Updated 4 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆71Updated 4 years ago
- Remove API hooks from a Beacon process.☆268Updated 3 years ago
- Reflective DLL loading of your favorite Golang program☆167Updated 5 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆277Updated 3 years ago
- Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.☆174Updated 4 years ago
- A Collection of In-Memory Shellcode Execution Techniques for Windows☆147Updated 5 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆122Updated 4 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆184Updated 4 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆157Updated 4 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆187Updated 4 years ago
- Scripts for performing and detecting parent PID spoofing☆144Updated 4 years ago
- Golang PE injection on windows☆166Updated 3 years ago
- Evasive Process Hollowing Techniques☆137Updated 4 years ago