githubesson / chrome_abe_pocLinks
golang decryption poc of the new app bound encryption introduced in chrome version 127.
☆21Updated 7 months ago
Alternatives and similar repositories for chrome_abe_poc
Users that are interested in chrome_abe_poc are comparing it to the libraries listed below
Sorting:
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆21Updated 7 months ago
- Near compile-time string obfuscation for Golang☆13Updated last year
- Decrypting yandex browser passwords☆21Updated 2 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆75Updated this week
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆34Updated last month
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆18Updated last month
- ☆25Updated 8 months ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆32Updated 3 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆56Updated 3 weeks ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆21Updated 2 months ago
- Core Submodule of Exploration C2☆16Updated 3 weeks ago
- Ntdll Unhooking☆12Updated 2 months ago
- Change hash for a signed pe☆16Updated last year
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 2 months ago
- Windows C++ Implant for Exploration C2☆31Updated 3 weeks ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆20Updated 2 months ago
- A mutliple tactics to execute shellcode in go :}☆20Updated 2 months ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆27Updated last year
- Load and execute a common object file format (COFF) in the current process☆30Updated last year
- find dll base addresses without PEB WALK☆93Updated last month
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Updated 2 months ago
- Go Shellcode Loader to be Integrated in Exploration C2☆27Updated 4 months ago
- Shellcode Loader Utilizing ETW Events☆63Updated 4 months ago
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆69Updated 2 months ago
- A C# implementation that disables Windows Firewall bypassing UAC☆15Updated 8 months ago
- UAC Bypass using RequestTrace scheduled task☆20Updated 3 months ago
- converts sRDI compatible dlls to shellcode☆29Updated 5 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆39Updated 9 months ago
- Ransomware written in go, encrypt - decrypt.☆25Updated 2 months ago