☆40Aug 27, 2025Updated 6 months ago
Alternatives and similar repositories for OS-Development
Users that are interested in OS-Development are comparing it to the libraries listed below
Sorting:
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- A Modern, stable and advanced login system.☆13Oct 13, 2021Updated 4 years ago
- - Automated Discord bot for Submitting Rebates and getting you easy visa cards. Educational purposes only.☆16May 13, 2021Updated 4 years ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Test antiviruses☆12Dec 3, 2023Updated 2 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- simple zero-dependency timer implementation☆12May 24, 2023Updated 2 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- .NET Code Virtualization with cool features. Once intended to sell. Rip VirtualGuard.io☆16Feb 8, 2026Updated 3 weeks ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated last year
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- .NET 4.5 Remote Access Tool (RAT) implementation with Telegram's API as server☆11Jul 29, 2022Updated 3 years ago
- Changes the window titles of running processes.☆10Aug 15, 2019Updated 6 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- ☆12Feb 12, 2021Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- ☆12Apr 5, 2025Updated 10 months ago
- Reverse engineering malware samples☆16Dec 3, 2021Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- A bot that escrows crypto transactions on Reddit☆13Oct 16, 2024Updated last year
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 2 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- 关闭恶意驱动的文件和注册表保护☆14Jun 28, 2022Updated 3 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆25Jul 9, 2025Updated 7 months ago
- Utility for running files/scripts/apps as Administrator☆13Nov 14, 2025Updated 3 months ago
- Введение в разработку вредоносных программ☆11Oct 15, 2023Updated 2 years ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆10Feb 17, 2023Updated 3 years ago