eloj / lzw-eddyView external linksLinks
Single-header LZW (Lempel-Ziv-Welch) C Library, headerless compressor & decompressor (variable code, 9-16 bits)
☆22Jan 2, 2026Updated last month
Alternatives and similar repositories for lzw-eddy
Users that are interested in lzw-eddy are comparing it to the libraries listed below
Sorting:
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- Rookit and anti rookit on Windows platform☆14Apr 30, 2024Updated last year
- Signature finder (from PE-bear)☆39Aug 25, 2025Updated 5 months ago
- A bunch of scripts and code i wrote.☆149Nov 7, 2024Updated last year
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- A thin Rust wrapper around Windows' hardware breakpoints.☆21Jul 14, 2022Updated 3 years ago
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Hotkey-based keylogger for Windows☆32Oct 17, 2024Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Feb 11, 2024Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆79Dec 21, 2022Updated 3 years ago
- Red Team Operation's Defense Evasion Technique.☆56Jun 4, 2024Updated last year
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- The code is a pingback to the Dark Vortex blog:☆187Jan 26, 2023Updated 3 years ago
- Windows x64 kernel mode rootkit process hollowing POC.☆189Jun 30, 2023Updated 2 years ago
- ☆126Jun 28, 2023Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆48Nov 2, 2022Updated 3 years ago
- spoof return address☆79Apr 28, 2023Updated 2 years ago
- Shared Obfuscation Core☆124Mar 20, 2020Updated 5 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 2 years ago
- Windows Sandbox Framework☆40Dec 31, 2021Updated 4 years ago
- Hide Port In Windows☆42Oct 24, 2024Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆138Sep 12, 2022Updated 3 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- ☆12Feb 4, 2025Updated last year
- A persistant Windows Service Proof of Concept, where the Service will run after Restart or Shutdown, and invoke a given software executab…☆37Sep 28, 2023Updated 2 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆246Jul 9, 2024Updated last year
- Playing with LLVM passes☆40Aug 17, 2023Updated 2 years ago
- IDA plugin for COM☆48Sep 30, 2022Updated 3 years ago
- Simple x86 Trampoline Hook☆45Aug 3, 2022Updated 3 years ago
- A way to use fonts to obfuscate text.☆50Dec 22, 2022Updated 3 years ago
- Activate Windows & Office 🔑☆13Jun 15, 2024Updated last year
- ☆15Feb 15, 2022Updated 4 years ago
- ☆100Oct 7, 2023Updated 2 years ago