bapzz / Steganography-In-C
Image Steganography In C Language.
☆43Updated 8 years ago
Alternatives and similar repositories for Steganography-In-C:
Users that are interested in Steganography-In-C are comparing it to the libraries listed below
- Reimplementation of the KExecDD DSE bypass technique.☆46Updated 5 months ago
- Next gen process injection technique☆44Updated 4 years ago
- Get your data from the resource section manually, with no need for windows apis☆58Updated 4 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 5 months ago
- API Hammering with C++20☆45Updated 2 years ago
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆17Updated 9 months ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆51Updated 2 years ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆58Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆62Updated last year
- shell code example☆25Updated 2 weeks ago
- Standalone Metasploit-like XOR encoder for shellcode☆46Updated 9 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆45Updated 11 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆26Updated 6 months ago
- ☆42Updated 2 years ago
- Swiss army knife for payload encryption and obfuscation☆21Updated last year
- ☆36Updated this week
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆39Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)☆81Updated last year
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆81Updated last year
- ☆84Updated 6 months ago
- ☆51Updated last month
- stack spoofing☆80Updated 3 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆42Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆43Updated 11 months ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 9 months ago
- converts sRDI compatible dlls to shellcode☆21Updated last month
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆96Updated last year
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago