A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-based detection research, and evasion analysis.
☆24Jan 17, 2026Updated 4 months ago
Alternatives and similar repositories for Probabilistic-Call-Stack-PoC
Users that are interested in Probabilistic-Call-Stack-PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attack and introduction (info stealer), start your adventure in MMD☆20Sep 14, 2025Updated 8 months ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated 2 years ago
- converts sRDI compatible dlls to shellcode☆38Jan 20, 2025Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆52Jul 6, 2025Updated 10 months ago
- ☆19Sep 1, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆160Nov 28, 2025Updated 5 months ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆22Nov 9, 2023Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 11 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆40Dec 7, 2024Updated last year
- Develop macOS apps on Windows with seamless cross-platform tools.☆16Jun 5, 2025Updated 11 months ago
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 7 months ago
- Transform any binary file to a PNG image☆13Jul 19, 2019Updated 6 years ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆161Feb 14, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Living Off The Land API☆59Feb 2, 2026Updated 3 months ago
- Generate malware with AI☆220Apr 14, 2026Updated last month
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 7 months ago
- Execute shellcode via Bluetooth device authentication☆41Feb 19, 2025Updated last year
- ☆16Mar 17, 2025Updated last year
- gnuplot ported for android☆19Jan 11, 2018Updated 8 years ago
- x64 version☆36Oct 8, 2021Updated 4 years ago
- OWASP ThreatAtlas is a collaborative platform for community-driven threat modeling.☆63May 10, 2026Updated last week
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆12Jan 4, 2025Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆129Jan 29, 2026Updated 3 months ago
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14May 2, 2024Updated 2 years ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆97Jul 7, 2025Updated 10 months ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- A security checking tool☆113Feb 4, 2026Updated 3 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 6 months ago
- ☆34Mar 19, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆13Mar 24, 2026Updated last month
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆63Jun 15, 2025Updated 11 months ago
- Payload Generation Workflow☆41Jul 18, 2025Updated 10 months ago
- ☆50Dec 5, 2025Updated 5 months ago
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 8 months ago
- A curated collection of amazing software, libraries, documents, books, resources, and other cool security-related content.☆14Nov 13, 2024Updated last year
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…