emilarner / revsocks
Cross-platform SOCKS5 proxy server program/library written in C that can also reverse itself over a firewall.
☆31Updated 2 years ago
Alternatives and similar repositories for revsocks:
Users that are interested in revsocks are comparing it to the libraries listed below
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆45Updated last year
- Change hash for a signed pe☆16Updated last year
- An Obfuscator-LLVM based mingw-w64 toolchain.☆38Updated 3 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆41Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆22Updated 11 months ago
- Enabled / Disable LSA Protection via BYOVD☆66Updated 3 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆29Updated 3 years ago
- A PoC tool for exploiting leaked process and thread handles☆30Updated last year
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago
- ☆37Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- Artemis - C++ Hell's Gate Syscall Implementation☆32Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Hide Port In Windows☆38Updated 5 months ago
- Implementation of several code injection techniques.☆20Updated 3 years ago
- In-memory hiding technique☆48Updated 3 months ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆62Updated last year
- My try to implement a virtual CPU in C☆19Updated last year
- ☆26Updated 3 years ago
- ☆13Updated 2 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- 关闭恶意驱动的文件和注册表保护☆12Updated 2 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆13Updated 5 months ago
- PoC for the Untrusted Pointer Dereference in the appid.sys driver☆16Updated 11 months ago
- ☆56Updated 2 years ago
- Windows LPE Nday☆25Updated 11 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- Get your data from the resource section manually, with no need for windows apis☆61Updated 5 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆46Updated last year