Stuuxx / awesome-persistenceView external linksLinks
Persistence techniques for windows.
☆19Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for awesome-persistence
Users that are interested in awesome-persistence are comparing it to the libraries listed below
Sorting:
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Simple program to stream offsets for your game cheat, Was reversing some p2c and decided to recreate a better version of this function fo…☆11Sep 12, 2022Updated 3 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 3 years ago
- ☆48Jul 24, 2023Updated 2 years ago
- fix wow obfucated IAT☆10Aug 4, 2021Updated 4 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- Implementation of the user-space eBPF VM based on the iovisor version (https://github.com/iovisor/ubpf)☆13Apr 16, 2020Updated 5 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Dec 17, 2024Updated last year
- This driver hooks a device object for ioctl and uses mdls to allocate physical pages and manually injects an entry into a process's page …☆15Feb 14, 2023Updated 3 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Apr 4, 2022Updated 3 years ago
- a parser for the .map file included in the aimware leak☆16Feb 19, 2023Updated 2 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆36May 12, 2022Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- ☆16Jul 14, 2023Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆12Jan 27, 2024Updated 2 years ago
- ☆17Apr 18, 2023Updated 2 years ago
- ☆22Updated this week
- ☆16Sep 19, 2025Updated 4 months ago
- Symbolic Execution Engine in Rust☆21Oct 8, 2023Updated 2 years ago
- Pentest scriptkit for your copypasta☆14May 12, 2025Updated 9 months ago
- ☆16Oct 31, 2022Updated 3 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆22Jan 1, 2023Updated 3 years ago
- ☆79Aug 5, 2024Updated last year
- A simple way to spoof return addresses using an exception handler☆43Aug 3, 2022Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆77Aug 28, 2021Updated 4 years ago
- Sans-I/O style simple and lightweight mDNS client/server library for any async runtime.☆22Dec 12, 2025Updated 2 months ago
- Password:ВсеБудеУкраїна☆16Mar 21, 2022Updated 3 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆23Nov 9, 2023Updated 2 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆77Feb 26, 2022Updated 3 years ago
- OSCP tools and notes☆40Jan 21, 2019Updated 7 years ago
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- Dorian is an intuitive high-level abstraction for declaring imperative programs that can be compiled or interpreted using LLVM and Cranel…☆21Jun 11, 2025Updated 8 months ago
- Windows NT port of 'Main is usually a function. So then when is it not?'☆27Mar 11, 2024Updated last year
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆27Mar 8, 2023Updated 2 years ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆50Jan 12, 2025Updated last year
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Aug 21, 2024Updated last year
- Windows driver template, using C++20 & cmake & GithubActions☆24Aug 9, 2024Updated last year