Nordgaren / stealth-winLinks
☆48Updated 2 years ago
Alternatives and similar repositories for stealth-win
Users that are interested in stealth-win are comparing it to the libraries listed below
Sorting:
- Rust implementation of lazy_importer☆58Updated 2 years ago
- Finding Truth in the Shadows☆120Updated 2 years ago
- x86-64 virtualizing obfuscator written in Rust☆77Updated 2 years ago
- ☆109Updated 3 weeks ago
- Dynamically invoke arbitrary code in Rust (Dinvoke)☆99Updated last month
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115Updated 2 years ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Updated 8 months ago
- A thin Rust wrapper around Windows' hardware breakpoints.☆21Updated 3 years ago
- A Rust crate to parse user-mode minidump files generated on Windows☆18Updated last month
- ☆93Updated last year
- A set of LLVM and GCC based plugins that perform code obfuscation.☆136Updated 2 months ago
- Reflective DLL self-loading as a library☆21Updated 8 months ago
- Rust For Windows Cheatsheet☆121Updated last month
- ☆14Updated last year
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 2 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆57Updated last year
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆47Updated 7 months ago
- Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files☆69Updated 2 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆118Updated last year
- Easy encrypt/decrypt data with TPM☆25Updated last year
- kernel-mode DLL Injector☆123Updated 8 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆74Updated 6 months ago
- Minifilter Callback Patching Proof-of-Concept☆73Updated 3 years ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆103Updated 10 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆73Updated last year
- ☆53Updated 5 months ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆73Updated 9 months ago
- A PoC packer written in Rust!☆74Updated 3 years ago
- Virtual Trust Level (VTL 1) secure call tracing☆84Updated 4 months ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25Updated 8 months ago