arget13 / memdlopenLinks
dlopen() filelessly a shared object or even a program (and run it).
☆56Updated 2 years ago
Alternatives and similar repositories for memdlopen
Users that are interested in memdlopen are comparing it to the libraries listed below
Sorting:
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆85Updated 2 years ago
- Template-based generation of shellcode loaders☆79Updated last year
- Linux Sleep Obfuscation☆108Updated last year
- random code snippets, useful for getting started☆123Updated last month
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago
- Create Anti-Copy DRM Malware☆69Updated last year
- ☆100Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆85Updated last year
- Select any exported function in a dll as the new dll's entry point.☆81Updated last year
- ☆50Updated 3 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- Kernel Mode Driver for Elevating Process Privileges☆134Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆76Updated last month
- Shellcode loader that executes embedded Lua from Rust.☆126Updated last year
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Updated 3 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆108Updated 2 years ago
- ☆89Updated 2 years ago
- Linux Process Injection via Seccomp Notifier☆78Updated 3 weeks ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆85Updated 8 months ago
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆152Updated 2 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Updated last year
- ☆64Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆100Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66Updated 2 years ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Updated last year
- ☆45Updated 3 months ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆113Updated last year
- From C to binary shellcode converter.☆48Updated last month
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆106Updated last year