elastic / SilhouetteView external linksLinks
Keep it secret, keep it safe
☆80Feb 6, 2025Updated last year
Alternatives and similar repositories for Silhouette
Users that are interested in Silhouette are comparing it to the libraries listed below
Sorting:
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- ☆25Apr 28, 2024Updated last year
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Detect strange memory regions and DLLs☆185Jan 20, 2022Updated 4 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆142Dec 13, 2022Updated 3 years ago
- ☆118Aug 7, 2022Updated 3 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Oct 10, 2022Updated 3 years ago
- ☆26May 6, 2024Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 10 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆675Dec 23, 2022Updated 3 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- ☆153Jul 31, 2022Updated 3 years ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆85Apr 11, 2023Updated 2 years ago
- Retrieve inner payloads from Donut samples☆117Dec 1, 2025Updated 2 months ago
- Using fibers to run in-memory code.☆240Oct 19, 2023Updated 2 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆75Jan 1, 2025Updated last year
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆19Apr 17, 2024Updated last year
- ☆225Oct 22, 2023Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- ☆59Oct 24, 2024Updated last year
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆314Aug 2, 2023Updated 2 years ago
- ☆247Dec 16, 2022Updated 3 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- Exploitation of echo_driver.sys☆170Sep 16, 2023Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Jun 2, 2022Updated 3 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆246Jul 9, 2024Updated last year
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- ☆84Nov 21, 2024Updated last year
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- A PoC project for embedding shellcode to Hint/Name Table☆113May 16, 2022Updated 3 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Aug 16, 2022Updated 3 years ago
- ETW based POC to identify direct and indirect syscalls☆190Apr 19, 2023Updated 2 years ago
- You shall pass☆271Jul 16, 2022Updated 3 years ago
- ☆90Jun 2, 2024Updated last year
- ☆42Apr 5, 2025Updated 10 months ago
- ☆385Jan 19, 2023Updated 3 years ago