RSSU-Shellcode / Gleam-RT
A runtime that can hide instruction and memory data in the sleep time.
☆17Updated this week
Alternatives and similar repositories for Gleam-RT:
Users that are interested in Gleam-RT are comparing it to the libraries listed below
- converts sRDI compatible dlls to shellcode☆21Updated last month
- ☆19Updated 2 weeks ago
- ☆52Updated last month
- stack spoofing☆79Updated 3 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆36Updated 6 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆46Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated 11 months ago
- Execute dotnet app from unmanaged process☆71Updated 2 months ago
- ☆98Updated last year
- ☆85Updated 6 months ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆62Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆70Updated last year
- BypassCredGuard CS BOF☆31Updated last month
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆43Updated last year
- ☆37Updated 3 weeks ago
- ☆36Updated 2 years ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆34Updated last year
- Threadless shellcode injection tool☆63Updated 7 months ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆35Updated 3 years ago
- Get your data from the resource section manually, with no need for windows apis☆58Updated 4 months ago
- A basic C2 framework written in C☆59Updated 8 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆47Updated last year
- Using LNK files and user input simulation to start processes under explorer.exe☆24Updated 5 months ago