☆124May 12, 2021Updated 4 years ago
Alternatives and similar repositories for shutter
Users that are interested in shutter are comparing it to the libraries listed below
Sorting:
- A Mythic Agent written in PIC C.☆207Feb 4, 2025Updated last year
- For when DLLMain is the only way☆424Oct 29, 2024Updated last year
- ☆121Nov 21, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- You shall pass☆270Jul 16, 2022Updated 3 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,821Nov 3, 2024Updated last year
- ☆181Apr 24, 2025Updated 10 months ago
- Finding Truth in the Shadows☆123Jan 26, 2023Updated 3 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆277Apr 17, 2023Updated 2 years ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆340Feb 2, 2026Updated last month
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆123Jan 17, 2026Updated last month
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Tools for interacting with authentication packages using their individual message protocols☆403Feb 1, 2026Updated last month
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- Load a dynamic library from memory by modifying the native Windows loader☆285Jun 18, 2025Updated 8 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- Sniffing files generator☆61Feb 24, 2025Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆368Apr 19, 2023Updated 2 years ago
- ☆101Oct 7, 2023Updated 2 years ago
- DLL proxying for lazy people☆200Dec 1, 2025Updated 3 months ago
- ☆153Jul 31, 2022Updated 3 years ago
- A bunch of scripts and code i wrote.☆149Nov 7, 2024Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- "Service-less" driver loading☆184Nov 28, 2024Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆323Jan 17, 2024Updated 2 years ago
- UAC bypass by abusing RPC and debug objects.☆627Oct 19, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆434Dec 21, 2023Updated 2 years ago
- ☆246Dec 16, 2022Updated 3 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆318Feb 2, 2026Updated last month
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆458Aug 2, 2024Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆190Mar 4, 2024Updated last year