BYOVD collection
☆24Mar 20, 2024Updated last year
Alternatives and similar repositories for rusty_drivers
Users that are interested in rusty_drivers are comparing it to the libraries listed below
Sorting:
- Introducing a powerful solution that converts any non-XP-compatible 32-bit exe or dll into a Windows XP-friendly binary. Our patch files …☆29Apr 3, 2024Updated last year
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 3 weeks ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- 针对finereportv10反序列化接口/webroot/decision/remote/design/channel进行无回显检测并提供Godzilla memshell注入功能(部分环境缺少依赖无法成功)☆24Oct 17, 2023Updated 2 years ago
- HVNC PoC (Hidden VNC) in Rust☆40Sep 2, 2025Updated 5 months ago
- Extract data of TTD trace file to a minidump☆31Jul 31, 2023Updated 2 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- Fastjson Poc for 1.2.33~1.2.36 with bcel☆11Oct 27, 2020Updated 5 years ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- macOS shellcode loader written in Objective-C☆49Jul 15, 2022Updated 3 years ago
- Repository for archiving Cobalt Strike configuration☆36Updated this week
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆15Sep 8, 2023Updated 2 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Exploitation of echo_driver.sys☆170Sep 16, 2023Updated 2 years ago
- Using fibers to run in-memory code.☆242Oct 19, 2023Updated 2 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Mar 17, 2023Updated 2 years ago
- iSwordSDK (Provide Powerful Kernel API For Ring3 Applications)☆15Mar 25, 2022Updated 3 years ago
- Scan vulnerable drivers on Windows with loldrivers.io☆188Sep 11, 2023Updated 2 years ago
- run ssh, https, and openvpn on the same port☆15Feb 5, 2014Updated 12 years ago
- Woodpecker模板项目,方便创建新插件☆14Jul 25, 2024Updated last year
- 基于go语言的帆软报表漏洞检测工具☆14Sep 4, 2022Updated 3 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- 强制认证扫描与利用☆12Jul 21, 2023Updated 2 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Async rust support for the reverse-engineered Crowdstrike Falcon protocol between the Sensor and cloud services☆17Mar 10, 2023Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago
- jolokia Realm JNDI RCE 漏洞检测,并获取明文密码☆18May 29, 2023Updated 2 years ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆17Sep 11, 2023Updated 2 years ago
- ☆18Aug 15, 2024Updated last year
- Get USB Devices from Registry hives☆22Nov 15, 2021Updated 4 years ago
- Enabled / Disable LSA Protection via BYOVD☆81Dec 8, 2021Updated 4 years ago
- Shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆137Dec 22, 2024Updated last year
- ☆163Oct 25, 2023Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Jan 12, 2023Updated 3 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆389Jul 30, 2024Updated last year