eversinc33 / PSXecute
32bit MIPS I VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.
☆103Updated last month
Alternatives and similar repositories for PSXecute:
Users that are interested in PSXecute are comparing it to the libraries listed below
- "Service-less" driver loading☆147Updated last month
- A Mythic Agent written in PIC C.☆167Updated last week
- A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls☆105Updated 4 months ago
- A collection of position independent coding resources☆64Updated last week
- ☆136Updated last month
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆96Updated 9 months ago
- ☆134Updated last year
- A cmkr based win32 shellcode template for a unified build platform and more production friendly structure/testing.☆65Updated last month
- Malware?☆69Updated 3 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆215Updated 4 months ago
- AzureAD beacon object files☆105Updated last month
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆157Updated last month
- ☆136Updated 5 months ago
- 64-bit, position-independent implant template for Windows in Rust.☆103Updated 3 months ago
- A newer iteration of TitanLdr with some newer hooks, and design. A generic user defined reflective DLL I built to prove a point to Mudge …☆172Updated last year
- ☆60Updated 7 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 5 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆40Updated 6 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆115Updated 7 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆96Updated last year
- Simple BOF to read the protection level of a process☆114Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆66Updated 2 weeks ago
- BOF with Synthetic Stackframe☆58Updated this week
- ☆121Updated 4 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆68Updated 5 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆101Updated 3 weeks ago
- A PoC for Early Cascade process injection technique.☆90Updated last week
- ☆111Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆151Updated 3 weeks ago
- Activation Context Hijack☆140Updated last month