☆31Sep 12, 2024Updated last year
Alternatives and similar repositories for warbird-example
Users that are interested in warbird-example are comparing it to the libraries listed below
Sorting:
- Linux Process Injection via Seccomp Notifier☆83Dec 9, 2025Updated 2 months ago
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- Library for linking multiple PE\PE + files to one☆52Mar 16, 2024Updated last year
- Compile-time Evaluable SHA3 in C++: Permutation-based Cryptographic Hashing☆13Updated this week
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Spoofing the NVIDIA GPU UUID by modifying "nvlddmkm.sys"☆15Sep 11, 2024Updated last year
- A runtime for developing large-scale and complex shellcode.☆22Feb 15, 2026Updated last week
- ☆24Jul 15, 2023Updated 2 years ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Nov 18, 2024Updated last year
- shellcode transformation tool for YARA evasion☆52Dec 17, 2025Updated 2 months ago
- The aPLib compression algorithm adapted for the Commodore c64 / c128.☆22Feb 20, 2022Updated 4 years ago
- Reverse Socks5 proxy for windows☆16Oct 13, 2022Updated 3 years ago
- Admin to Kernel code execution using the KSecDD driver☆265Apr 19, 2024Updated last year
- Windows process injection methods☆19Aug 11, 2019Updated 6 years ago
- Windows x64 DLL/Driver manual map injection on a non-present PML4E using physical memory read/writes, direct page table manipulation and …☆85Sep 28, 2025Updated 4 months ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆26Apr 24, 2022Updated 3 years ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆93Jul 7, 2025Updated 7 months ago
- Binary lifter and deobfuscator using remill for x86_64 Windows binaries☆57Updated this week
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 3 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆63Dec 25, 2025Updated 2 months ago
- A Simple PoC☆22May 24, 2024Updated last year
- ☆28Dec 20, 2025Updated 2 months ago
- ☆27Oct 15, 2025Updated 4 months ago
- A universal binary patching dll.☆117Oct 9, 2024Updated last year
- This is a modified version of Mini-CRT++ in the book <程序员的自我修养>, it supports 32-bit and 64-bit system.☆22Jul 26, 2016Updated 9 years ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆22Feb 9, 2024Updated 2 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆80Sep 2, 2024Updated last year
- Dictionary compressor with nibbled ANS and optimal parsing. Other compression experiments.☆26Apr 13, 2025Updated 10 months ago
- PoC for thread pool based process injection in Windows.☆122Mar 29, 2025Updated 10 months ago
- Open Anti Cheat☆27Jul 16, 2022Updated 3 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- x86 and x64 assembly "read-eval-print loop" for Windows☆35Aug 13, 2017Updated 8 years ago
- NtCreateUserProcess with CsrClientCallServer for mainstream Windows x64 version☆44Jul 16, 2024Updated last year
- Disk based DMA for ATA and SCSI☆42Sep 22, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆96Mar 20, 2023Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year