Error996 / bdvlLinks
bdvl
☆115Updated 3 years ago
Alternatives and similar repositories for bdvl
Users that are interested in bdvl are comparing it to the libraries listed below
Sorting:
- A ptrace POC by hooking SSH to reveal provided passwords☆187Updated 8 years ago
- Go implementation of the Heaven's Gate technique☆101Updated 4 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- Small tool to get a SYSTEM shell☆129Updated 9 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 5 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆70Updated 6 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆62Updated 2 years ago
- Proof-of-concept code for various bugs☆110Updated last year
- Proxy Unix applications in the terminal☆116Updated 4 years ago
- ☆170Updated 4 years ago
- Golang PE injection on windows☆169Updated 4 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆107Updated 2 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Updated 5 years ago
- ☆154Updated 5 years ago
- Shellcode injector using direct syscalls☆123Updated 5 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- ☆302Updated 3 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆166Updated 4 years ago
- A Collection of In-Memory Shellcode Execution Techniques for Windows☆151Updated 6 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆158Updated 5 years ago
- ☆103Updated 3 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆106Updated 4 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆234Updated last year
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆131Updated 4 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- Example code for EDR bypassing☆151Updated 6 years ago
- ☆52Updated 4 years ago