dmcxblue / calc_pocLinks
A repository holding Proof of Concepts for executing the calculator application via different file formats
☆38Updated last year
Alternatives and similar repositories for calc_poc
Users that are interested in calc_poc are comparing it to the libraries listed below
Sorting:
- Create Anti-Copy DRM Malware☆59Updated 10 months ago
- ☆107Updated 4 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 4 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆105Updated 2 years ago
- Do some DLL SideLoading magic☆84Updated last year
- I have documented all of the AMSI patches that I learned till now☆73Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Find DLLs with RWX section☆81Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- Lateral Movement via the .NET Profiler☆82Updated 7 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆61Updated last month
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆63Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Mockingjay process self injection POC☆35Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆99Updated this week
- ☆124Updated last year
- ☆143Updated 8 months ago
- A BOF to enumerate system process, their protection levels, and more.☆117Updated 7 months ago
- C# havoc implant☆101Updated 2 years ago
- Section-based payload obfuscation technique for x64☆61Updated 11 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆75Updated 11 months ago
- ☆124Updated 10 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 6 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 8 months ago
- ☆82Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆98Updated 2 years ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Updated last year