A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-based detection research, and evasion analysis.
☆25Jan 17, 2026Updated 2 months ago
Alternatives and similar repositories for Probabilistic-Call-Stack-PoC
Users that are interested in Probabilistic-Call-Stack-PoC are comparing it to the libraries listed below
Sorting:
- Obsidian Vault for my Cybersecurity learning☆10Oct 20, 2024Updated last year
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 8 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- ☆19Sep 1, 2025Updated 6 months ago
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆154Nov 28, 2025Updated 3 months ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 9 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- Develop macOS apps on Windows with seamless cross-platform tools.☆16Jun 5, 2025Updated 9 months ago
- Bring your own Unwind Data Framework☆77Updated this week
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 5 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆144Feb 14, 2026Updated last month
- Transform any binary file to a PNG image☆13Jul 19, 2019Updated 6 years ago
- Generate malware with AI☆204Feb 27, 2026Updated 2 weeks ago
- Living Off The Land API☆59Feb 2, 2026Updated last month
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- Execute shellcode via Bluetooth device authentication☆41Feb 19, 2025Updated last year
- ☆15Mar 17, 2025Updated last year
- gnuplot ported for android☆19Jan 11, 2018Updated 8 years ago
- x64 version☆36Oct 8, 2021Updated 4 years ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆118Jan 29, 2026Updated last month
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆35Nov 7, 2025Updated 4 months ago
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14May 2, 2024Updated last year
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 8 months ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆56Jun 15, 2025Updated 9 months ago
- A security checking tool☆110Feb 4, 2026Updated last month
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 4 months ago
- ☆33Mar 19, 2025Updated 11 months ago
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆12Nov 25, 2025Updated 3 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 8 months ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 6 months ago
- ☆25Jul 27, 2024Updated last year