eversinc33 / GpuDecryptShellcodeLinks
XOR decrypting shellcode using the GPU with OpenCL.
☆100Updated 2 months ago
Alternatives and similar repositories for GpuDecryptShellcode
Users that are interested in GpuDecryptShellcode are comparing it to the libraries listed below
Sorting:
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- ☆50Updated 2 years ago
- ☆86Updated 2 years ago
- ☆38Updated 2 years ago
- ☆114Updated 2 years ago
- Template-based generation of shellcode loaders☆78Updated last year
- bring your own vulnerable driver☆102Updated 2 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆71Updated 3 years ago
- I have documented all of the AMSI patches that I learned till now☆73Updated 4 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆86Updated 2 years ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆40Updated 3 years ago
- Identify and exploit leaked handles for local privilege escalation.☆109Updated 2 years ago
- ☆100Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆121Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆105Updated last year
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆130Updated 11 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83Updated 2 years ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆48Updated last year
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆81Updated last week
- Sleep Obfuscation☆45Updated 2 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆104Updated 2 years ago
- A nice process dumping tool☆82Updated 3 years ago
- Plantronics Desktop Hub LPE☆36Updated last year
- Exploitation of echo_driver.sys☆170Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆62Updated last year