cocomelonc / meow
Cybersecurity research results. Simple C/C++ and Python implementations
☆212Updated last week
Alternatives and similar repositories for meow:
Users that are interested in meow are comparing it to the libraries listed below
- Important notes and topics on my journey towards mastering Windows Internals☆371Updated 10 months ago
- My collection of malware dev links☆260Updated 6 months ago
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆241Updated 5 months ago
- Performing Indirect Clean Syscalls☆521Updated last year
- ☆342Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆335Updated last month
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆656Updated 2 weeks ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆527Updated 3 weeks ago
- ☆255Updated last year
- A small x64 library to load dll's into memory.☆435Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆243Updated 4 months ago
- Collect Windows telemetry for Maldev☆318Updated last month
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆364Updated 5 months ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆180Updated last year
- Analyse your malware to surgically obfuscate it☆457Updated last month
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆686Updated 2 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆256Updated 9 months ago
- ☆254Updated 2 years ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆367Updated 3 months ago
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆423Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆369Updated last month
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆208Updated 4 months ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆369Updated last year
- The Definitive Guide To Process Cloning on Windows☆462Updated last year
- TartarusGate, Bypassing EDRs☆570Updated 3 years ago
- Sleep Obfuscation☆734Updated last year
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆278Updated 10 months ago
- Process Injection using Thread Name☆250Updated 6 months ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆445Updated last year
- ☆130Updated last year