almounah / hardwareturningpointLinks
HardwareTurningPoint, Fully Go Compatible Hardware Breakpoint
ā17Updated 11 months ago
Alternatives and similar repositories for hardwareturningpoint
Users that are interested in hardwareturningpoint are comparing it to the libraries listed below
Sorting:
- š | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rubyā10Updated 8 months ago
- Good CLR Host with Native patchless AMSI Bypassā97Updated 8 months ago
- Indirect Syscall with TartarusGate Approach in Goā132Updated 6 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.ā81Updated 6 months ago
- ā126Updated last year
- ā139Updated 2 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpointsā119Updated 6 months ago
- BOF with Synthetic Stackframeā206Updated 2 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooksā134Updated last year
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsā104Updated 3 years ago
- Agent for AdaptixC2 with focus in evasion, capability and malleable.ā122Updated 2 weeks ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.ā101Updated last year
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, pā¦ā192Updated last week
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strikeā180Updated 2 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsassā166Updated 3 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, fā¦ā166Updated last year
- Bypass LSA protection using the BYODLL techniqueā170Updated last year
- Shellcode loaderā97Updated last year
- Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan ā¦ā196Updated last month
- ā121Updated 11 months ago
- Encode shellcode into dictionary words for evasion and entropy reductionā38Updated 3 weeks ago
- Cobaltstrike Reflective Loader with Synthetic Stackframeā144Updated 11 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)ā196Updated 11 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.ā75Updated last year
- Generate an Alphabetical Polymorphic Shellcodeā133Updated 4 months ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryptionā176Updated 3 weeks ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible iā¦ā59Updated 9 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooksā161Updated 2 years ago
- A Mythic agent for Windows written in Cā148Updated last week
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.ā202Updated 2 years ago