Goodies365 / YandexDecrypt
Decrypting yandex browser passwords
☆13Updated 2 weeks ago
Alternatives and similar repositories for YandexDecrypt:
Users that are interested in YandexDecrypt are comparing it to the libraries listed below
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆22Updated 3 months ago
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆65Updated 2 weeks ago
- Windows AppLocker Driver (appid.sys) LPE☆54Updated 8 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆89Updated 10 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- shell code example☆34Updated last week
- Dynamically invoke arbitrary code with Rust tricks, #[no_std] support, and compatibility for x64, x86, ARM64 and WoW64 (DInvoke)☆60Updated 3 weeks ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆144Updated last month
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆24Updated 9 months ago
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆25Updated 5 months ago
- UAC Bypass using CMSTP in Rust☆26Updated 4 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆126Updated 3 months ago
- "Service-less" driver loading☆151Updated 4 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆71Updated this week
- Payload encoding utility to effectively lower payload entropy.☆116Updated last week
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 10 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆48Updated 11 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆69Updated last year
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆11Updated 4 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆57Updated 5 months ago
- using the gpu to hide your payload☆57Updated 2 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆47Updated 7 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆105Updated 4 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Malware?☆69Updated 6 months ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Updated last year
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆23Updated last year
- Bypass LSA protection using the BYODLL technique☆157Updated 7 months ago