NUL0x4C / NoRunPILinks
Run Your Payload Without Running Your Payload
☆180Updated 2 years ago
Alternatives and similar repositories for NoRunPI
Users that are interested in NoRunPI are comparing it to the libraries listed below
Sorting:
- POC for frustrating/defeating Malware Analysts☆156Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- Infect Shared Files In Memory for Lateral Movement☆194Updated 2 years ago
- PE obfuscator with Evasion in mind☆211Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆205Updated 2 years ago
- Weaponized HellsGate/SigFlip☆199Updated 2 years ago
- Do some DLL SideLoading magic☆84Updated last year
- Patching AmsiOpenSession by forcing an error branching☆146Updated 2 years ago
- ☆248Updated 2 years ago
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆194Updated 2 years ago
- (Demo) 3rd party agent for Havoc☆140Updated last year
- Execute shellcode files with rundll32☆207Updated last year
- random code snippets, useful for getting started☆121Updated 8 months ago
- ☆108Updated 2 years ago
- ☆164Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Your syscall factory☆124Updated last month
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆136Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆109Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆115Updated 3 years ago
- ☆124Updated last year
- Bypass Malware Sandbox Evasion Ram check☆138Updated 2 years ago
- Generate Shellcode Loaders & Injects☆156Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆88Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆98Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆219Updated 3 years ago
- Payload Loader With Evasion Features☆318Updated 2 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆149Updated 2 years ago
- Windows Kernel Offensive Toolset☆125Updated last month
- Hookers are cooler than patches.☆170Updated 3 years ago