ViperXSecurity / lib-nosa
lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.
☆109Updated 7 months ago
Alternatives and similar repositories for lib-nosa:
Users that are interested in lib-nosa are comparing it to the libraries listed below
- "Service-less" driver loading☆152Updated 4 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆73Updated 3 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 9 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆112Updated 4 months ago
- Malware?☆69Updated 6 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆92Updated last year
- Windows rootkit designed to work with BYOVD exploits☆182Updated 3 months ago
- ☆61Updated 10 months ago
- ☆154Updated 4 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆258Updated 7 months ago
- A set of programs for analyzing common vulnerabilities in COM☆210Updated 7 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆74Updated last month
- A Mythic Agent written in PIC C.☆186Updated 2 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆99Updated last year
- ☆102Updated 3 months ago
- Bypass LSA protection using the BYODLL technique☆157Updated 6 months ago
- An example reference design for a proposed BOF PE☆158Updated last month
- Activation Context Hijack☆152Updated 4 months ago
- shell code example☆34Updated last month
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆99Updated last year
- Admin to Kernel code execution using the KSecDD driver☆244Updated 11 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆90Updated last month
- ☆135Updated last year
- Find DLLs with RWX section☆79Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆177Updated last year
- ☆104Updated 5 months ago
- ☆42Updated 2 years ago
- ☆113Updated last month
- Local & remote Windows DLL Proxying☆164Updated 10 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago