Real-Cryillic / SarlaLinks
It's what all the kids are talking about
☆12Updated 2 years ago
Alternatives and similar repositories for Sarla
Users that are interested in Sarla are comparing it to the libraries listed below
Sorting:
- ☆38Updated 7 months ago
- ☆47Updated 2 years ago
- idk man this was the default github name☆35Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- miscellaneous codes☆35Updated 2 years ago
- macOS dylib stager☆36Updated 9 months ago
- An In-memory Embedding of CPython☆30Updated 4 years ago
- Python module for running BOFs☆74Updated 2 years ago
- PoC XLL builder in Python/Nim☆49Updated 2 years ago
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 11 months ago
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- ELF Beacon Object File (BOF) Template☆19Updated last year
- various methods of making API calls☆19Updated 9 months ago
- BOF for C2 framework☆44Updated last year
- Post-Ex BOF tooling for Hannibal☆24Updated last year
- maldev obviously☆28Updated 6 months ago
- ☆30Updated 2 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆61Updated last year
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 9 months ago
- API Hammering with C++20☆49Updated 3 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Updated 3 years ago
- A simple Linux in-memory .so loader☆33Updated 2 years ago
- ☆37Updated 7 months ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Updated 2 years ago