Kudaes / Fiber
Using fibers to run in-memory code.
☆206Updated last year
Alternatives and similar repositories for Fiber:
Users that are interested in Fiber are comparing it to the libraries listed below
- Exploitation of process killer drivers☆200Updated last year
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆205Updated 2 years ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆337Updated last year
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆333Updated 9 months ago
- WTSRM☆210Updated 2 years ago
- Rust For Windows Cheatsheet☆119Updated 6 months ago
- miscellaneous scripts and programs☆242Updated 3 months ago
- ROP-based sleep obfuscation to evade memory scanners☆349Updated 3 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆338Updated 3 months ago
- Beacon Object File Loader☆286Updated last year
- Remote Shellcode Injector☆213Updated last year
- EDRSandblast-GodFault☆261Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆292Updated last year
- ☆256Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆185Updated last year
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆372Updated last year
- Threadless Process Injection through entry point hijacking☆344Updated 8 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆291Updated last year
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆243Updated 10 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆330Updated 2 years ago
- Windows rootkit designed to work with BYOVD exploits☆198Updated 3 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆160Updated 11 months ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆212Updated 2 years ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆258Updated 10 months ago
- Reuse open handles to dynamically dump LSASS.☆243Updated last year
- Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs☆296Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆293Updated last year
- C++ self-Injecting dropper based on various EDR evasion techniques.☆374Updated last year
- BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released a…☆380Updated last year
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆187Updated last year