farinap5 / bitmap4shell
A (quite) simple steganography algorithm to hide shellcodes within bitmap image.
☆21Updated 8 months ago
Alternatives and similar repositories for bitmap4shell:
Users that are interested in bitmap4shell are comparing it to the libraries listed below
- Exploiting the KsecDD Windows driver through Server Silos☆38Updated 2 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- Artemis - C++ Hell's Gate Syscall Implementation☆31Updated last year
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆43Updated 11 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆41Updated last year
- Beacon Debugger☆39Updated 3 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- ☆38Updated 7 months ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆32Updated 3 years ago
- ☆43Updated last week
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆60Updated last year
- ☆59Updated 2 years ago
- converts sRDI compatible dlls to shellcode☆18Updated last week
- Execute dotnet app from unmanaged process☆68Updated last month
- ☆36Updated last year
- ☆43Updated last year
- ☆27Updated 6 months ago
- Plantronics Desktop Hub LPE☆37Updated 8 months ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆24Updated last year
- BYOVD collection☆21Updated 10 months ago
- ☆21Updated 9 months ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆42Updated last year
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆21Updated last year
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆32Updated 3 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆45Updated 4 months ago
- A PoC tool for exploiting leaked process and thread handles☆30Updated 11 months ago
- stack spoofing☆77Updated 2 months ago
- ☆37Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year