PIC shellcode (C/C++) development toolkit designed for malware developers.
☆121Dec 23, 2025Updated 2 months ago
Alternatives and similar repositories for epic
Users that are interested in epic are comparing it to the libraries listed below
Sorting:
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆129Nov 17, 2025Updated 4 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- BOF with Synthetic Stackframe☆233Oct 30, 2025Updated 4 months ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 4 months ago
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆59Mar 1, 2026Updated 2 weeks ago
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆264Aug 31, 2025Updated 6 months ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆107Jan 21, 2026Updated 2 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- A cross-platform C++ framework for building Windows shellcode☆163Mar 4, 2026Updated 2 weeks ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆189Jan 17, 2026Updated 2 months ago
- Mentally ill EtwTi parser☆69Jan 11, 2026Updated 2 months ago
- ☆139Jan 16, 2025Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆37Aug 5, 2025Updated 7 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- A cmake template for crystal palace☆39Dec 20, 2025Updated 3 months ago
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆69Nov 15, 2025Updated 4 months ago
- ☆55May 31, 2025Updated 9 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆200Apr 21, 2025Updated 11 months ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆115Aug 29, 2022Updated 3 years ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆129Jan 28, 2026Updated last month
- Windows rootkit designed to work with BYOVD exploits☆217Jan 18, 2025Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆105Feb 25, 2025Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆122Sep 8, 2024Updated last year
- ☆53Jun 28, 2025Updated 8 months ago
- ☆18Aug 8, 2024Updated last year
- ☆54Oct 13, 2025Updated 5 months ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆271Jun 18, 2025Updated 9 months ago
- Overview of MS Defender☆118Feb 20, 2026Updated last month
- A Mythic Agent written in PIC C.☆206Feb 4, 2025Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- A Mythic agent for Windows written in C☆162Mar 14, 2026Updated last week
- A rust library that allows you to host the CLR and execute dotnet binaries.☆235Mar 12, 2025Updated last year
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 7 months ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year