HackerCalico / StackSpoofer_Macro
An easy-to-use and powerful Macro for Stack Spoofing.
☆15Updated 2 months ago
Alternatives and similar repositories for StackSpoofer_Macro:
Users that are interested in StackSpoofer_Macro are comparing it to the libraries listed below
- ☆30Updated last year
- An implementation of an indirect system call☆122Updated last year
- shellcode生成框架☆84Updated 8 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆46Updated last year
- ☆20Updated last year
- Efficient RAT signature locator for bypassing AV/EDR, supporting static scanning and memory scanning.☆34Updated 5 months ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆62Updated last year
- UAC Bypass using RequestTrace scheduled task☆12Updated 2 weeks ago
- A basic C2 framework written in C☆59Updated 8 months ago
- UAC Bypass using UIAccess program QuickAssist☆74Updated last month
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆33Updated 3 years ago
- Kill Protected Process Light Process (include av)☆56Updated last year
- A runtime that can hide instruction and memory data in the sleep time.☆17Updated this week
- Execute dotnet app from unmanaged process☆71Updated 2 months ago
- It stinks☆102Updated 2 years ago
- Core Submodule of Exploration C2☆15Updated last week
- A Simple PoC☆20Updated 10 months ago
- vehsyscall:a syscall project that may bypass EDR☆54Updated last year
- TypeLib persistence technique☆108Updated 5 months ago
- stack spoofing☆80Updated 4 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- ☆26Updated last year
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆11Updated 11 months ago
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆39Updated 7 months ago
- My personal shellcode loader☆32Updated 2 years ago
- ☆47Updated 11 months ago
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆41Updated 2 years ago
- Help red teams find opsec processes during engagements☆36Updated 3 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆39Updated 7 months ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆35Updated 3 years ago