A Patchless AMSI Bypass Technique using VEH²
☆32Jun 22, 2025Updated 9 months ago
Alternatives and similar repositories for VEH2
Users that are interested in VEH2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 11 months ago
- Detect BypassUAC using AMSI☆29Feb 18, 2025Updated last year
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- ☆21Jan 8, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆46Aug 16, 2025Updated 7 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- Remotely dump NT hashes through Windows Crash dumps☆33Oct 29, 2024Updated last year
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆39Jul 23, 2025Updated 8 months ago
- A python exploit to automatically dump all the data stored by the auto-completion plugin of Ametys CMS to a local sqlite database file.☆14May 3, 2022Updated 3 years ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆29Aug 18, 2025Updated 7 months ago
- A Python script to find tenant id an region from a list of domain names.☆18Jan 31, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- A Python script to list valid emails of GSuite accounts.☆16Feb 11, 2025Updated last year
- A tool to show only printable characters of a file☆11Oct 2, 2023Updated 2 years ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 4 months ago
- A simple python script to download videos hosted on streamable from their link☆11Mar 16, 2024Updated 2 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆14Jan 15, 2025Updated last year
- A script to factorize integers with sagemath and factordb.☆12Feb 11, 2025Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A webshell plugin and interactive shell for pentesting JoGet application.☆15May 19, 2022Updated 3 years ago
- List of linux kernel versions and download links in JSON☆10Jun 29, 2024Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆40Mar 6, 2025Updated last year
- Extract the windows major and minor build numbers from an ISO file, and automatically sort the iso files.☆17Oct 8, 2024Updated last year
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 8 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆23Nov 28, 2024Updated last year
- Modified version of Pypykatz to print encrypted credentials☆56Dec 26, 2022Updated 3 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆48Oct 4, 2025Updated 5 months ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆46May 24, 2025Updated 10 months ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- A cross-platform tool to work with Security Identifiers (SID) formats.☆16Jun 21, 2025Updated 9 months ago