Windows System Programming Experiments
☆221Jun 13, 2022Updated 3 years ago
Alternatives and similar repositories for wspe
Users that are interested in wspe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Kernel Programming Experiments☆84Sep 18, 2022Updated 3 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆193Aug 3, 2025Updated 7 months ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆136Jan 2, 2023Updated 3 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆218Feb 20, 2023Updated 3 years ago
- ☆170Jan 7, 2022Updated 4 years ago
- ☆48Jun 30, 2020Updated 5 years ago
- c++ implementation of windows heavens gate☆71Feb 12, 2021Updated 5 years ago
- Hijack Printconfig.dll to execute shellcode☆101Jan 15, 2021Updated 5 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated 2 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆843Mar 11, 2021Updated 5 years ago
- Dump the memory of a PPL with a userland exploit☆887Jul 24, 2022Updated 3 years ago
- LoadLibrary for offensive operations☆1,179Oct 22, 2021Updated 4 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆580Mar 8, 2024Updated 2 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆226Sep 13, 2022Updated 3 years ago
- Silence EDRs by removing kernel callbacks☆238Dec 7, 2020Updated 5 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆333Oct 9, 2021Updated 4 years ago
- A simple program to hook the current process to identify the manual syscall executions on windows☆266Nov 18, 2022Updated 3 years ago
- miscellaneous scripts and programs☆278Jan 23, 2025Updated last year
- Original C Implementation of the Hell's Gate VX Technique☆1,170Jun 28, 2021Updated 4 years ago
- Experiment on reproducing Obfuscate & Sleep☆163Mar 14, 2021Updated 5 years ago
- Beacon Object File (BOF) for remote process injection via thread hijacking☆221Jan 13, 2021Updated 5 years ago
- ☆73Oct 24, 2021Updated 4 years ago
- ☆209Apr 5, 2022Updated 3 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆233Mar 18, 2024Updated 2 years ago
- A way to delete a locked file, or current running executable, on disk.☆618Nov 5, 2025Updated 4 months ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆595Jul 26, 2021Updated 4 years ago
- A simple COM server which provides a component to run shellcode☆148May 12, 2020Updated 5 years ago
- Obfuscate specific windows apis with different apis☆1,023Feb 21, 2021Updated 5 years ago
- Windows Kernel Programming☆133May 11, 2020Updated 5 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆553Dec 3, 2023Updated 2 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Inject .NET assemblies into an existing process☆507Jan 19, 2022Updated 4 years ago
- POCs for Shellcode Injection via Callbacks☆412Feb 23, 2021Updated 5 years ago
- C Header Only Library for Virii☆11Nov 17, 2020Updated 5 years ago