NUL0x4C / GPView external linksLinks
using the gpu to hide your payload
☆63Aug 15, 2022Updated 3 years ago
Alternatives and similar repositories for GP
Users that are interested in GP are comparing it to the libraries listed below
Sorting:
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Replace the .txt section of the current loaded modules from \KnownDlls\☆305Sep 28, 2022Updated 3 years ago
- Implementing AES 256 CBC in AES-NI - MASM Format☆19Aug 9, 2025Updated 6 months ago
- API Hammering with C++20☆50Jul 21, 2022Updated 3 years ago
- Simple API Hooks detector☆77Aug 22, 2022Updated 3 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- Bypass Malware Time Delays☆108Sep 23, 2022Updated 3 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- ☆44Apr 27, 2024Updated last year
- transform your payload into ipv4/ipv6/mac arrays☆242Aug 18, 2022Updated 3 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Sep 6, 2021Updated 4 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!☆454Mar 8, 2023Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Jan 3, 2023Updated 3 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Mar 17, 2023Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆111Aug 7, 2025Updated 6 months ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆501Jan 10, 2023Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated 11 months ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 2 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Apr 21, 2022Updated 3 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆246Jul 9, 2024Updated last year
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆181Feb 10, 2023Updated 3 years ago
- WTSRM☆216Aug 7, 2022Updated 3 years ago
- Get your data from the resource section manually, with no need for windows apis☆67Oct 22, 2024Updated last year
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Nov 19, 2022Updated 3 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 2 months ago
- baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability☆348Sep 27, 2023Updated 2 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- ☆24May 28, 2021Updated 4 years ago