Identifies bad bytes from static analysis with any Anti-Virus scanner.
☆129Jul 5, 2024Updated last year
Alternatives and similar repositories for MultCheck
Users that are interested in MultCheck are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆192Mar 4, 2024Updated 2 years ago
- ☆102Oct 7, 2023Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆413Jan 11, 2026Updated 2 months ago
- ☆209Nov 28, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Local & remote Windows DLL Proxying☆174Jun 17, 2024Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Feb 9, 2024Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆622Jan 2, 2025Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Jun 2, 2022Updated 3 years ago
- ROP-based sleep obfuscation to evade memory scanners☆380Jun 22, 2025Updated 9 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆107Jan 24, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆210Jun 10, 2024Updated last year
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- Library of BOFs to interact with SQL servers☆231Dec 3, 2025Updated 4 months ago
- Simple BOF to read the protection level of a process☆119May 10, 2023Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- ☆127Sep 1, 2024Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 11 months ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- ☆245May 5, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Splitting and executing shellcode across multiple pages☆103Jun 8, 2023Updated 2 years ago
- PoC demonstrating a multi process injection chain aimed at remotely executing shellcode☆259Jan 21, 2024Updated 2 years ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆558Nov 23, 2025Updated 4 months ago
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆270Sep 14, 2023Updated 2 years ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- ☆122Nov 21, 2024Updated last year
- indirect syscalls for AV/EDR evasion in Go assembly☆378Jun 13, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆131Sep 27, 2023Updated 2 years ago
- DLL proxying for lazy people☆203Dec 1, 2025Updated 4 months ago
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- ☆64Jan 2, 2024Updated 2 years ago