dmcxblue / calc_pocView external linksLinks
A repository holding Proof of Concepts for executing the calculator application via different file formats
☆42Jun 27, 2024Updated last year
Alternatives and similar repositories for calc_poc
Users that are interested in calc_poc are comparing it to the libraries listed below
Sorting:
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated 10 months ago
- ☆27Nov 7, 2023Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 6 months ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 5 months ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆66Oct 17, 2023Updated 2 years ago
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 6 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- User-Defined C2 BOF Template☆27Nov 24, 2025Updated 2 months ago
- ☆11Jun 9, 2020Updated 5 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆53Jun 2, 2025Updated 8 months ago
- Ghosting-AMSI☆222Apr 24, 2025Updated 9 months ago
- ☆38Apr 15, 2025Updated 9 months ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 3 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- ☆17Jan 9, 2025Updated last year
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆10Jan 25, 2026Updated 2 weeks ago
- ☆21Jan 8, 2026Updated last month
- ☆11Nov 12, 2023Updated 2 years ago
- ☆13May 18, 2022Updated 3 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- ☆19Jul 23, 2025Updated 6 months ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- ☆61Dec 19, 2024Updated last year
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆63Dec 15, 2025Updated last month
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 9 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 10 months ago
- Inject DLLs into the explorer process using icons☆403May 18, 2025Updated 8 months ago
- ☆19Mar 9, 2021Updated 4 years ago
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 9 months ago
- Spoof parent process ID☆13Jan 23, 2019Updated 7 years ago