amberchalia / fraction_loaderView external linksLinks
☆48Oct 14, 2025Updated 3 months ago
Alternatives and similar repositories for fraction_loader
Users that are interested in fraction_loader are comparing it to the libraries listed below
Sorting:
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆26Jul 4, 2025Updated 7 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Jul 23, 2025Updated 6 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 6 months ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- A small How-To on creating your own weaponized WSL file☆119Jul 23, 2025Updated 6 months ago
- A repo of scripts I find helpful for daily tasks.☆31Dec 8, 2025Updated 2 months ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆50May 5, 2025Updated 9 months ago
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 9 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆135Apr 18, 2025Updated 9 months ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆88Jan 2, 2026Updated last month
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 9 months ago
- ☆109Oct 29, 2024Updated last year
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆29Oct 2, 2025Updated 4 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆62May 16, 2025Updated 8 months ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- ☆53Sep 23, 2025Updated 4 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆25Jul 9, 2025Updated 7 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆75Jun 16, 2025Updated 7 months ago
- ☆54Oct 13, 2025Updated 4 months ago
- ☆48Jun 6, 2025Updated 8 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆66Feb 11, 2025Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆12May 17, 2024Updated last year
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 8 months ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 2 months ago
- Misery Loader to bypass modern EDR solutions☆17Dec 20, 2024Updated last year
- ☆159May 5, 2025Updated 9 months ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated last month
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- A hoontr must hoont☆102Nov 27, 2025Updated 2 months ago
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 6 months ago
- ☆50Jun 4, 2025Updated 8 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆208Dec 25, 2024Updated last year
- Bunch of BOF files☆38Jun 30, 2025Updated 7 months ago
- Permanently disable EDRs as local admin☆125Dec 19, 2025Updated last month
- Stage 0☆169Dec 18, 2024Updated last year
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 7 months ago