Fileless attack with persistence
☆372Jun 28, 2025Updated 9 months ago
Alternatives and similar repositories for living-off-the-land
Users that are interested in living-off-the-land are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI☆735Jun 28, 2025Updated 9 months ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆2,129Apr 6, 2026Updated last week
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 9 months ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Executable that mutates its own code☆392Jun 28, 2025Updated 9 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆295Jul 15, 2023Updated 2 years ago
- Performing Indirect Clean Syscalls☆606Apr 19, 2023Updated 3 years ago
- Now You See Me, Now You Don't☆1,042Jan 23, 2026Updated 2 months ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- This program is designed to demonstrate various process injection techniques☆1,235Aug 7, 2025Updated 8 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆593Aug 2, 2025Updated 8 months ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,581Jan 5, 2021Updated 5 years ago
- .NET project for installing Persistence☆497Jun 26, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆825Aug 23, 2021Updated 4 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆109Jan 3, 2021Updated 5 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆551Dec 3, 2023Updated 2 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆688Mar 11, 2024Updated 2 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 9 months ago
- Open-Source Shellcode & PE Packer☆2,087Feb 3, 2024Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆791Jan 26, 2026Updated 2 months ago
- An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting…☆1,101Jun 17, 2022Updated 3 years ago
- Performance Monitor Volatile Environment LPE☆18Jun 28, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,312Feb 15, 2026Updated 2 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆992Dec 4, 2022Updated 3 years ago
- Syscall Shellcode Loader (Work in Progress)☆1,259May 8, 2024Updated last year
- Phantom DLL hollowing PoC☆372May 23, 2022Updated 3 years ago
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,268Aug 27, 2023Updated 2 years ago
- TartarusGate, Bypassing EDRs☆661Jan 25, 2022Updated 4 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆226Jul 25, 2023Updated 2 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,067Oct 14, 2025Updated 6 months ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,166Mar 31, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆721Aug 5, 2020Updated 5 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆428Feb 11, 2024Updated 2 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆95Jun 28, 2025Updated 9 months ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆722Jul 19, 2023Updated 2 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,620Jul 31, 2024Updated last year
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆459Oct 25, 2021Updated 4 years ago
- C/C++ source obfuscator for antivirus bypass☆1,066Mar 10, 2022Updated 4 years ago