A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-based detection research, and evasion analysis.
☆24Jan 17, 2026Updated 2 months ago
Alternatives and similar repositories for Probabilistic-Call-Stack-PoC
Users that are interested in Probabilistic-Call-Stack-PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Obsidian Vault for my Cybersecurity learning☆10Oct 20, 2024Updated last year
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 9 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- ☆19Sep 1, 2025Updated 7 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆158Nov 28, 2025Updated 4 months ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- Develop macOS apps on Windows with seamless cross-platform tools.☆16Jun 5, 2025Updated 10 months ago
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 5 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆150Feb 14, 2026Updated last month
- Transform any binary file to a PNG image☆13Jul 19, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Living Off The Land API☆59Feb 2, 2026Updated 2 months ago
- Generate malware with AI☆217Feb 27, 2026Updated last month
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated last year
- ☆15Mar 17, 2025Updated last year
- gnuplot ported for android☆19Jan 11, 2018Updated 8 years ago
- x64 version☆36Oct 8, 2021Updated 4 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆35Nov 7, 2025Updated 5 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆125Jan 29, 2026Updated 2 months ago
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14May 2, 2024Updated last year
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆94Jul 7, 2025Updated 9 months ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 4 months ago
- ☆34Mar 19, 2025Updated last year
- A security checking tool☆112Feb 4, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆13Mar 24, 2026Updated 2 weeks ago
- AI agents running research on single-GPU nanochat training automatically☆34Mar 16, 2026Updated 3 weeks ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆60Jun 15, 2025Updated 9 months ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 6 months ago
- Payload Generation Workflow☆41Jul 18, 2025Updated 8 months ago
- ☆48Dec 5, 2025Updated 4 months ago