Error996 / bdvlLinks
bdvl
☆115Updated 3 years ago
Alternatives and similar repositories for bdvl
Users that are interested in bdvl are comparing it to the libraries listed below
Sorting:
- A ptrace POC by hooking SSH to reveal provided passwords☆188Updated 8 years ago
- Proxy system calls over an RPC channel☆100Updated 3 years ago
- Proxy Unix applications in the terminal☆116Updated 4 years ago
- Linux Kernel module-less implant (backdoor)☆73Updated 4 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆70Updated 7 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆62Updated 2 years ago
- Go implementation of the Heaven's Gate technique☆101Updated 4 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆75Updated 4 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 5 years ago
- Golang PE injection on windows☆169Updated 4 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Updated 5 years ago
- Proof-of-concept code for various bugs☆112Updated last year
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Updated 5 years ago
- Shellcode injector using direct syscalls☆123Updated 5 years ago
- ☆155Updated 5 years ago
- Small tool to get a SYSTEM shell☆129Updated 9 years ago
- ☆52Updated 4 years ago
- ☆101Updated 3 years ago
- ☆170Updated 4 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆140Updated 3 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆166Updated 4 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆158Updated 5 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆66Updated 4 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆133Updated 2 years ago
- ☆309Updated 3 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆108Updated 3 years ago
- Move CS beacon to GPU memory when sleeping☆251Updated 4 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Updated 5 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- A Collection of In-Memory Shellcode Execution Techniques for Windows☆152Updated 6 years ago