Fileless attack with persistence
☆371Jun 28, 2025Updated 9 months ago
Alternatives and similar repositories for living-off-the-land
Users that are interested in living-off-the-land are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI☆736Jun 28, 2025Updated 9 months ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆2,115Feb 19, 2026Updated last month
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 9 months ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Executable that mutates its own code☆393Jun 28, 2025Updated 9 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆293Jul 15, 2023Updated 2 years ago
- Performing Indirect Clean Syscalls☆607Apr 19, 2023Updated 2 years ago
- Now You See Me, Now You Don't☆1,034Jan 23, 2026Updated 2 months ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- This program is designed to demonstrate various process injection techniques☆1,229Aug 7, 2025Updated 7 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆594Aug 2, 2025Updated 7 months ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,579Jan 5, 2021Updated 5 years ago
- .NET project for installing Persistence☆497Jun 26, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆824Aug 23, 2021Updated 4 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆109Jan 3, 2021Updated 5 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆553Dec 3, 2023Updated 2 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆688Mar 11, 2024Updated 2 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 9 months ago
- Open-Source Shellcode & PE Packer☆2,084Feb 3, 2024Updated 2 years ago
- An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting…☆1,099Jun 17, 2022Updated 3 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆787Jan 26, 2026Updated 2 months ago
- Performance Monitor Volatile Environment LPE☆18Jun 28, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,287Feb 15, 2026Updated last month
- Tool to bypass LSA Protection (aka Protected Process Light)☆990Dec 4, 2022Updated 3 years ago
- Syscall Shellcode Loader (Work in Progress)☆1,258May 8, 2024Updated last year
- Phantom DLL hollowing PoC☆372May 23, 2022Updated 3 years ago
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,264Aug 27, 2023Updated 2 years ago
- TartarusGate, Bypassing EDRs☆658Jan 25, 2022Updated 4 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆225Jul 25, 2023Updated 2 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,066Oct 14, 2025Updated 5 months ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆722Aug 5, 2020Updated 5 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆426Feb 11, 2024Updated 2 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Jun 28, 2025Updated 9 months ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆721Jul 19, 2023Updated 2 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,606Jul 31, 2024Updated last year
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆457Oct 25, 2021Updated 4 years ago
- C/C++ source obfuscator for antivirus bypass☆1,066Mar 10, 2022Updated 4 years ago