PoC code of Shade BIOS (stripped) presented at Black Hat USA 2025
☆61Jul 16, 2025Updated 8 months ago
Alternatives and similar repositories for ShadeBIOS
Users that are interested in ShadeBIOS are comparing it to the libraries listed below
Sorting:
- ☆18Feb 29, 2024Updated 2 years ago
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- porting ntfs-3g for UEFI☆11Oct 21, 2019Updated 6 years ago
- ☆42Jun 23, 2024Updated last year
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆147Jul 17, 2025Updated 8 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆246Mar 9, 2026Updated last week
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- binary instrumentation, analysis, and patching framework☆102Feb 20, 2026Updated last month
- Exploit POC for CVE-2024-36877☆48Aug 14, 2024Updated last year
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 8 months ago
- Panoptes Endpoint Detection and Response Solution☆43Mar 7, 2026Updated 2 weeks ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 7 months ago
- ☆108Aug 21, 2024Updated last year
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆81Aug 3, 2025Updated 7 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆166Jul 30, 2025Updated 7 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 11 months ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 11 months ago
- Tiny Regular Expression Matcher☆10May 23, 2019Updated 6 years ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- ☆29Jun 18, 2025Updated 9 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆438Jun 27, 2025Updated 8 months ago
- A set of classes and command line tools that work with system firmware tables (ACPI, SMBIOS)☆26Oct 13, 2016Updated 9 years ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 10 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆117Jan 25, 2026Updated last month
- ☆19Mar 24, 2017Updated 8 years ago
- ☆21Dec 16, 2024Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Aug 22, 2024Updated last year
- Windows Network File System Remote exploit for CVE-2022-30136☆14Jul 11, 2023Updated 2 years ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 6 months ago
- MUSL libc port for UEFI☆11Sep 26, 2017Updated 8 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 7 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago