bapzz / Steganography-In-CLinks
Image Steganography In C Language.
☆47Updated 8 years ago
Alternatives and similar repositories for Steganography-In-C
Users that are interested in Steganography-In-C are comparing it to the libraries listed below
Sorting:
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆65Updated 3 months ago
- In-memory hiding technique☆56Updated 7 months ago
- Splitting and executing shellcode across multiple pages☆102Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆39Updated 11 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Updated 3 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆51Updated 11 months ago
- shell code example☆61Updated 2 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- ☆35Updated 7 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆73Updated 9 months ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆50Updated last year
- Get your data from the resource section manually, with no need for windows apis☆64Updated 9 months ago
- A small NtCreateUserProcess PoC that spawns a Command prompt.☆96Updated 2 years ago
- A runtime for developing large-scale and complex shellcode.☆20Updated last month
- ☆41Updated 5 months ago
- Shellcode capable of bypassing EAF / IAF mitigations☆20Updated 2 years ago
- BYOVD Technique Example using viragt64 driver☆47Updated last year
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆129Updated 3 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- Next gen process injection technique☆54Updated 5 years ago
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆72Updated last month
- Shellcode Loader Utilizing ETW Events☆64Updated 5 months ago
- ☆87Updated 11 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆54Updated last year
- kernel-mode DLL Injector☆103Updated 3 months ago
- Template-based generation of shellcode loaders☆78Updated last year
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆42Updated 2 years ago