eversinc33 / PSXecuteLinks
MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.
☆121Updated 11 months ago
Alternatives and similar repositories for PSXecute
Users that are interested in PSXecute are comparing it to the libraries listed below
Sorting:
- "Service-less" driver loading☆162Updated 11 months ago
- A collection of position independent coding resources☆100Updated this week
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆117Updated last year
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆106Updated 9 months ago
- ☆135Updated 10 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆106Updated last year
- Activation Context Hijack☆170Updated 3 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆43Updated last month
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆103Updated 8 months ago
- Linker for Beacon Object Files☆130Updated 2 weeks ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆74Updated this week
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆273Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆131Updated 2 months ago
- ForsHops☆59Updated 7 months ago
- ☆84Updated 9 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆129Updated 2 months ago
- A collection of PoCs to do common things in unconventional ways☆119Updated 2 months ago
- Malware?☆76Updated 3 weeks ago
- shell code example☆63Updated 2 weeks ago
- A Mythic Agent written in PIC C.☆202Updated 9 months ago
- Windows rootkit designed to work with BYOVD exploits☆211Updated 10 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆69Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆72Updated 3 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 10 months ago
- ☆97Updated last year
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆134Updated last year
- A 64 bit executable junk code engine for polymorphic malware.☆71Updated 5 months ago
- ☆159Updated 11 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Updated 7 months ago
- Code execution/injection technique using DLL PEB module structure manipulation☆213Updated 5 months ago