☆125May 12, 2021Updated 5 years ago
Alternatives and similar repositories for shutter
Users that are interested in shutter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- For when DLLMain is the only way☆436Oct 29, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆286Sep 18, 2024Updated last year
- A Mythic Agent written in PIC C.☆204Feb 4, 2025Updated last year
- ☆204May 10, 2026Updated last week
- You shall pass☆270Jul 16, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- ☆123Nov 21, 2024Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆289Apr 17, 2023Updated 3 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- Patching "signtool.exe" to accept expired certificates for code-signing.☆348Feb 2, 2026Updated 3 months ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆61Dec 11, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DLL proxying for lazy people☆204May 4, 2026Updated 2 weeks ago
- UAC bypass by abusing RPC and debug objects.☆630Oct 19, 2023Updated 2 years ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 9 months ago
- ☆103Oct 7, 2023Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆381Apr 19, 2023Updated 3 years ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆130Jan 17, 2026Updated 4 months ago
- "Service-less" driver loading☆186Nov 28, 2024Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆470Aug 2, 2024Updated last year
- Finding Truth in the Shadows☆129Jan 26, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆109Aug 21, 2024Updated last year
- Load a dynamic library from memory by modifying the native Windows loader☆301May 5, 2026Updated 2 weeks ago
- Tools for interacting with authentication packages using their individual message protocols☆437May 1, 2026Updated 3 weeks ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆322Feb 2, 2026Updated 3 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆193Mar 4, 2024Updated 2 years ago
- Sniffing files generator☆62Feb 24, 2025Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆327Jan 17, 2024Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆449Dec 21, 2023Updated 2 years ago
- TokenCert☆103Nov 15, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆246Dec 16, 2022Updated 3 years ago
- A simple Linux in-memory .so loader☆34Mar 29, 2023Updated 3 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,016Jun 4, 2024Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆187Aug 2, 2023Updated 2 years ago
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆146Mar 16, 2024Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆365Dec 19, 2022Updated 3 years ago