TianNaYa / ClematisView external linksLinks
PE to shellcode
☆28Jan 1, 2025Updated last year
Alternatives and similar repositories for Clematis
Users that are interested in Clematis are comparing it to the libraries listed below
Sorting:
- Beta Linker☆20Aug 22, 2024Updated last year
- A little tool to play with Windows security☆12Jan 21, 2026Updated 3 weeks ago
- beta☆120Sep 24, 2024Updated last year
- PE to shellcode☆267Jan 1, 2025Updated last year
- ☆19Feb 27, 2022Updated 3 years ago
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Mar 17, 2023Updated 2 years ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆55Jul 1, 2023Updated 2 years ago
- ☆10Nov 2, 2023Updated 2 years ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- ☆26Apr 24, 2025Updated 9 months ago
- more conveniently Visual-Studio-BOF-template☆75Sep 12, 2023Updated 2 years ago
- 内网渗透、工具开发、二进制等相关笔记☆12Mar 26, 2023Updated 2 years ago
- Cobalt Strike 二开项目☆185Feb 11, 2023Updated 3 years ago
- A Windows C++ OLE/COM Object explorer written in WTL.☆16Feb 28, 2025Updated 11 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated 2 weeks ago
- An implementation of an indirect system call☆132Aug 25, 2023Updated 2 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Feb 25, 2025Updated 11 months ago
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆63Apr 29, 2024Updated last year
- simple shellcode injector for Windows / Process Hollowing☆15Jun 26, 2024Updated last year
- 自定义函数堆栈,从而绕过ETW检测,这个是完整版。☆13Apr 15, 2024Updated last year
- anonymous to cluster-admin via Heapdump.☆30Nov 16, 2023Updated 2 years ago
- ☆31Aug 31, 2021Updated 4 years ago
- ☆15Jul 13, 2024Updated last year
- 钓鱼上线后渗透工具☆132Feb 19, 2023Updated 2 years ago
- 通过生成不同hash的ico并写入程序中,实现批量bypass360QVM☆259Aug 10, 2023Updated 2 years ago
- Rust 重构的 sRDI☆17Sep 9, 2024Updated last year
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Feb 13, 2023Updated 3 years ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27May 13, 2025Updated 9 months ago
- 批量生成修改的图标+数字签名+详细说明后的PE文件☆19Aug 20, 2024Updated last year
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Jul 6, 2024Updated last year
- Bypass LSA protection using the BYODLL technique☆171Sep 21, 2024Updated last year
- Title is self explaining, well theres few methods we can do to read locked file and play with it...☆87Jan 5, 2026Updated last month
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- IDA Plugin exports all pseudocode at once for easy search and analysis☆21Jan 27, 2026Updated 2 weeks ago
- 存储练习项目,目前有GetWeChatBOF☆19Jul 26, 2023Updated 2 years ago
- tsh多终端代理通信☆19Feb 26, 2025Updated 11 months ago
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆78Jul 23, 2023Updated 2 years ago