Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.
☆72Mar 24, 2026Updated 3 weeks ago
Alternatives and similar repositories for Hermes
Users that are interested in Hermes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WinDbg cheat sheet☆17May 10, 2023Updated 2 years ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆68Jan 5, 2026Updated 3 months ago
- A Crystal Palace shared library to resolve & perform syscalls☆59Oct 29, 2025Updated 5 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆161Nov 23, 2025Updated 4 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆99Dec 22, 2025Updated 3 months ago
- Interprocess communication via a covert timing channel☆26Oct 24, 2025Updated 5 months ago
- A simple way to spoof return addresses using an exception handler☆44Aug 3, 2022Updated 3 years ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆127Dec 23, 2025Updated 3 months ago
- A collection of PoCs to do common things in unconventional ways☆121Aug 31, 2025Updated 7 months ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆202Jun 17, 2025Updated 10 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated 2 years ago
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆202Feb 11, 2026Updated 2 months ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A cmake template for crystal palace☆40Dec 20, 2025Updated 3 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆117Dec 21, 2025Updated 3 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 10 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆129Jan 28, 2026Updated 2 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆264Feb 2, 2026Updated 2 months ago
- An open-source tool for efficiently parsing x64dbg trace files (.trace32 & .trace64).☆43Jan 20, 2026Updated 2 months ago
- Help red teams find opsec processes during engagements☆43Dec 7, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- BOF to steal Teams cookies☆129Nov 2, 2025Updated 5 months ago
- Windows kernel driver that detects hypervisors by probing SIDT/LIDT edge cases, paging/TLB behaviors, privilege transitions, and timing e…☆43Mar 3, 2026Updated last month
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated last year
- Easy to include string and wstring obfuscation☆24Mar 12, 2022Updated 4 years ago
- Hook syscalls from ring0 without triggering PatchGuard☆25Oct 29, 2025Updated 5 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆190Jan 11, 2026Updated 3 months ago
- Demonstrating 3 persistence layers from a single EXE, that converts itself into proxy DLLs at runtime☆80Mar 29, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆55Dec 30, 2025Updated 3 months ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆74Jan 19, 2026Updated 2 months ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Hijacking Hyper-V at Runtime with DDMA☆98Aug 13, 2025Updated 8 months ago
- ☆163Jun 12, 2025Updated 10 months ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆162Jul 31, 2022Updated 3 years ago