Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/
☆41Jul 22, 2021Updated 4 years ago
Alternatives and similar repositories for ExploitDev
Users that are interested in ExploitDev are comparing it to the libraries listed below
Sorting:
- Experiment building lifting-bits dependencies with pure CMake. Migrated to:☆22Oct 8, 2024Updated last year
- Phantom DLL hollowing PoC☆372May 23, 2022Updated 3 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- ☆13Jul 15, 2021Updated 4 years ago
- Remove API hooks from a Beacon process.☆76Mar 13, 2022Updated 4 years ago
- ☆12Sep 29, 2021Updated 4 years ago
- Corsair LL Access driver abuse☆24Apr 16, 2021Updated 4 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆76Nov 12, 2021Updated 4 years ago
- Collection of shellcode injection and execution techniques☆18Updated this week
- ☆18Nov 24, 2020Updated 5 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆166Sep 10, 2021Updated 4 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Aug 3, 2021Updated 4 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆147May 23, 2022Updated 3 years ago
- Run Processes as PPL with ELAM☆177Mar 17, 2022Updated 4 years ago
- A bunch of scripts and code i wrote.☆149Nov 7, 2024Updated last year
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆359Sep 1, 2022Updated 3 years ago
- Samples from my book Windows Native API programming☆80May 11, 2025Updated 10 months ago
- ☆15Mar 17, 2025Updated last year
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- .lib file for linking against the NT CRT☆19Mar 18, 2022Updated 4 years ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆230Jan 20, 2024Updated 2 years ago
- ☆18Mar 1, 2021Updated 5 years ago
- A simple C++ driver base with KD data block☆11Jun 25, 2022Updated 3 years ago
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- Windows process injection methods☆18Jul 18, 2021Updated 4 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆241Nov 6, 2019Updated 6 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Jul 25, 2023Updated 2 years ago
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆53Aug 13, 2018Updated 7 years ago
- Shellcode loader that loads shellcode from UUID's☆22Updated this week
- ☆10Jun 11, 2022Updated 3 years ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆28Dec 30, 2024Updated last year