frank2 / blenny
A payload delivery system which embeds payloads in an executable's icon file!
☆72Updated 7 months ago
Related projects: ⓘ
- using the gpu to hide your payload☆47Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆28Updated last year
- Splitting and executing shellcode across multiple pages☆98Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.☆90Updated last year
- ☆101Updated last year
- Enabled / Disable LSA Protection via BYOVD☆61Updated 2 years ago
- ☆50Updated this week
- ☆57Updated this week
- Template-based generation of shellcode loaders☆63Updated 5 months ago
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆56Updated last year
- It's pointy and it hurts!☆120Updated last year
- A kernel vulnerability used to achieve arbitrary read-write on Windows prior to July 2022☆103Updated last year
- ☆73Updated this week
- This is my own implementation of the Perun's Fart technique by Sektor7☆64Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆96Updated 2 years ago
- API Hammering with C++20☆34Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- the Open Source and Pure C++ Packer for eXecutables☆18Updated last year
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆113Updated last year
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆120Updated last year
- Persistence via Shell Extensions☆60Updated last year
- ☆87Updated this week
- ☆68Updated this week
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆75Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆38Updated last year
- ☆100Updated this week
- A more reliable way of resolving syscall numbers in Windows☆49Updated 7 months ago
- ☆105Updated this week
- ☆56Updated 7 months ago
- ☆24Updated last year