demon-i386 / binarybinarybinaryLinks
some AV / EDR / analysis studies
☆11Updated 2 years ago
Alternatives and similar repositories for binarybinarybinary
Users that are interested in binarybinarybinary are comparing it to the libraries listed below
Sorting:
- API Hammering with C++20☆46Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 6 months ago
- Sample Rust Hooking Engine☆36Updated last year
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- idk man this was the default github name☆35Updated 2 years ago
- early cascade injection PoC based on Outflanks blog post, in rust☆59Updated 7 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- EvtPsst☆55Updated last year
- ☆48Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Collection of Rust repos useful for Red Teamers.☆32Updated 2 years ago
- bring your own clean ntdll (or other MS dlls)☆22Updated this week
- Heap encryption in Nim☆19Updated 10 months ago
- BOF for C2 framework☆41Updated 7 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆49Updated 9 months ago
- It's what all the kids are talking about☆12Updated 2 years ago
- Donut generator in rust.☆27Updated 3 years ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆37Updated 3 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- Mythic C2 Agent written in x64 PIC C☆79Updated 5 months ago
- Rust template/library for implementing your own COFF loader☆53Updated 5 months ago
- ☆26Updated 4 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- Section-based payload obfuscation technique for x64☆61Updated 10 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆16Updated 3 months ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆30Updated 3 weeks ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated 3 months ago