Create Anti-Copy DRM Malware
☆73Aug 19, 2024Updated last year
Alternatives and similar repositories for DRMBinViaOrdinalImports
Users that are interested in DRMBinViaOrdinalImports are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21Nov 6, 2024Updated last year
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆37Oct 30, 2024Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Convert your shellcode into an ASCII string☆129Jun 27, 2025Updated 10 months ago
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆291Jan 21, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆52Mar 30, 2026Updated last month
- Sleep obfuscation☆276Dec 13, 2024Updated last year
- Performing Indirect Clean Syscalls☆612May 2, 2026Updated 2 weeks ago
- ☆101Sep 1, 2024Updated last year
- Atomic test units for BOF execution☆57Apr 26, 2026Updated 3 weeks ago
- RunPE implementation with multiple evasive techniques (1)☆388Sep 22, 2023Updated 2 years ago
- PoC demonstrating a multi process injection chain aimed at remotely executing shellcode☆261Jan 21, 2024Updated 2 years ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Analyse your malware to surgically obfuscate it☆530Dec 17, 2025Updated 5 months ago
- ☆70Dec 19, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆286Apr 6, 2025Updated last year
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆154Aug 4, 2025Updated 9 months ago
- ☆101Jan 21, 2025Updated last year
- BOF with Synthetic Stackframe☆247Oct 30, 2025Updated 6 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆735May 7, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Extract and execute a PE embedded within a PNG file using an LNK file.☆471Nov 2, 2024Updated last year
- Templates for developing your own listeners and agents for AdaptixC2.☆50Feb 28, 2026Updated 2 months ago
- A New Exploitation Technique for Visual Studio Projects☆13Nov 5, 2023Updated 2 years ago
- Chisel new generation, written in rust. SSH under WSS with some customization.☆130Jan 24, 2026Updated 3 months ago
- Rusty Impersonate☆105Oct 15, 2025Updated 7 months ago
- A Reflective Loader for macOS☆149Jul 20, 2025Updated 9 months ago
- impersonate trustedinstaller by fiddling with tokens☆14Aug 30, 2021Updated 4 years ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆351Oct 7, 2024Updated last year
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- TypeLib persistence technique☆145Oct 22, 2024Updated last year
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Jun 30, 2025Updated 10 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆602Aug 2, 2025Updated 9 months ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆585Nov 23, 2025Updated 5 months ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆489Jul 12, 2023Updated 2 years ago
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Jan 14, 2025Updated last year
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆306Jul 31, 2024Updated last year