☆31Sep 12, 2024Updated last year
Alternatives and similar repositories for warbird-example
Users that are interested in warbird-example are comparing it to the libraries listed below
Sorting:
- ☆50Nov 7, 2024Updated last year
- Linux Process Injection via Seccomp Notifier☆84Dec 9, 2025Updated 3 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- ☆24Jul 15, 2023Updated 2 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 3 years ago
- Compile-time Evaluable SHA3 in C++: Permutation-based Cryptographic Hashing☆16Mar 5, 2026Updated 2 weeks ago
- Library for linking multiple PE\PE + files to one☆52Mar 16, 2024Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- Control Flow Linearization☆25May 4, 2025Updated 10 months ago
- A runtime for developing large-scale and complex shellcode.☆22Mar 3, 2026Updated 2 weeks ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- Spoofing the NVIDIA GPU UUID by modifying "nvlddmkm.sys"☆16Sep 11, 2024Updated last year
- Reverse Socks5 proxy for windows☆16Oct 13, 2022Updated 3 years ago
- Windows process injection methods☆19Aug 11, 2019Updated 6 years ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 8 months ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆24Feb 9, 2024Updated 2 years ago
- Open Anti Cheat☆27Jul 16, 2022Updated 3 years ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆26Apr 24, 2022Updated 3 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- shellcode transformation tool for YARA evasion☆58Dec 17, 2025Updated 3 months ago
- ☆29Dec 20, 2025Updated 2 months ago
- CPL remote trigger☆43Dec 28, 2025Updated 2 months ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Binary lifter and deobfuscator using remill for x86_64 Windows binaries☆73Mar 10, 2026Updated last week
- Windows x64 DLL/Driver manual map injection on a non-present PML4E using physical memory read/writes, direct page table manipulation and …☆86Sep 28, 2025Updated 5 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 4 months ago
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- Disk based DMA for ATA and SCSI☆42Sep 22, 2023Updated 2 years ago
- The aPLib compression algorithm adapted for the Commodore c64 / c128.☆22Feb 20, 2022Updated 4 years ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 2 months ago
- A method to Disable DSE using .data ptr hooks☆40Feb 1, 2024Updated 2 years ago
- silence file system monitoring components by hooking their minifilters☆61Jan 31, 2024Updated 2 years ago
- ☆31Oct 23, 2023Updated 2 years ago
- PowerShell script to generate ShellCode in various formats☆45Sep 25, 2024Updated last year
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- A Simple PoC☆22May 24, 2024Updated last year
- 这篇文章的目的是介绍一款实验性项目基于COM命名管道或者Windows Hyper-V虚拟机Vmbus通道实现的运行在uefi上的windbg调试引擎开发心得☆44Jun 16, 2024Updated last year