Payload encoding utility to effectively lower payload entropy.
☆129Apr 15, 2025Updated last year
Alternatives and similar repositories for codasm
Users that are interested in codasm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of scripts and CMake files to easily link to LLVM into your project (Windows, Linux, macOS).☆44Apr 2, 2025Updated last year
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Lightweight PDB symbol parser and resolver☆30Oct 28, 2024Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 2 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆286Sep 18, 2024Updated last year
- ☆127Sep 1, 2024Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 6 months ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆203Jun 17, 2025Updated 11 months ago
- COM ViewLogger — new malware keylogging technique☆407Jan 6, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- HookChain: A new perspective for Bypassing EDR Solutions☆603Jan 5, 2025Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆63Oct 19, 2024Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆123Sep 8, 2024Updated last year
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆228Apr 11, 2026Updated last month
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆146Mar 16, 2024Updated 2 years ago
- Call Stack Spoofing for Rust☆217Jan 28, 2026Updated 3 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆327Jan 17, 2024Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆197Feb 6, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A BOF that runs unmanaged PEs inline☆700Oct 23, 2024Updated last year
- ☆43Feb 18, 2025Updated last year
- A Mythic Agent written in PIC C.☆204Feb 4, 2025Updated last year
- Process Injection using Thread Name☆309Apr 18, 2025Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- early cascade injection PoC based on Outflanks blog post☆242Nov 7, 2024Updated last year
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆21Dec 3, 2024Updated last year
- PoC XLL builder in Python/Nim☆50Nov 21, 2022Updated 3 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆116Aug 29, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆107Feb 25, 2025Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆595Jun 12, 2024Updated last year
- ☆125May 12, 2021Updated 5 years ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆435Apr 18, 2026Updated last month
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆471Aug 2, 2024Updated last year