Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.
☆71Mar 24, 2026Updated this week
Alternatives and similar repositories for Hermes
Users that are interested in Hermes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WinDbg cheat sheet☆17May 10, 2023Updated 2 years ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆66Jan 5, 2026Updated 2 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆157Nov 23, 2025Updated 4 months ago
- A Crystal Palace shared library to resolve & perform syscalls☆59Oct 29, 2025Updated 4 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆100Dec 22, 2025Updated 3 months ago
- Interprocess communication via a covert timing channel☆26Oct 24, 2025Updated 5 months ago
- A simple way to spoof return addresses using an exception handler☆44Aug 3, 2022Updated 3 years ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆125Dec 23, 2025Updated 3 months ago
- A collection of PoCs to do common things in unconventional ways☆121Aug 31, 2025Updated 6 months ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆200Jun 17, 2025Updated 9 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆195Feb 11, 2026Updated last month
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 3 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A cmake template for crystal palace☆40Dec 20, 2025Updated 3 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆117Dec 21, 2025Updated 3 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆129Jan 28, 2026Updated 2 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆263Feb 2, 2026Updated last month
- An open-source tool for efficiently parsing x64dbg trace files (.trace32 & .trace64).☆42Jan 20, 2026Updated 2 months ago
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- BOF to steal Teams cookies☆127Nov 2, 2025Updated 4 months ago
- Windows kernel driver that detects hypervisors by probing SIDT/LIDT edge cases, paging/TLB behaviors, privilege transitions, and timing e…☆41Mar 3, 2026Updated 3 weeks ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- Easy to include string and wstring obfuscation☆23Mar 12, 2022Updated 4 years ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆70Jan 19, 2026Updated 2 months ago
- Hook syscalls from ring0 without triggering PatchGuard☆24Oct 29, 2025Updated 4 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆189Jan 11, 2026Updated 2 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆55Dec 30, 2025Updated 2 months ago
- Hijacking Hyper-V at Runtime with DDMA☆92Aug 13, 2025Updated 7 months ago
- ☆164Jun 12, 2025Updated 9 months ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆162Jul 31, 2022Updated 3 years ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆166Nov 2, 2025Updated 4 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month