Error996 / bdvlLinks
bdvl
☆114Updated 3 years ago
Alternatives and similar repositories for bdvl
Users that are interested in bdvl are comparing it to the libraries listed below
Sorting:
- A ptrace POC by hooking SSH to reveal provided passwords☆185Updated 8 years ago
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- Golang PE injection on windows☆167Updated 4 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆68Updated 6 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated 2 years ago
- Go implementation of the Heaven's Gate technique☆98Updated 4 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 4 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- Small tool to get a SYSTEM shell☆129Updated 9 years ago
- ☆151Updated 4 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Proof-of-concept code for various bugs☆111Updated 9 months ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆188Updated 4 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- A Collection of In-Memory Shellcode Execution Techniques for Windows☆150Updated 6 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆229Updated last year
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- ☆170Updated 4 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆153Updated 5 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆101Updated 2 years ago
- ☆96Updated 3 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆166Updated 3 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆130Updated 2 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆58Updated 2 years ago
- Windows (ShadowMove) Socket Duplication☆84Updated 5 years ago
- Shellcode injector using direct syscalls☆120Updated 4 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Updated 6 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆122Updated 5 years ago
- Move CS beacon to GPU memory when sleeping☆246Updated 3 years ago