githubesson / chrome_abe_poc
golang decryption poc of the new app bound encryption introduced in chrome version 127.
☆20Updated 3 months ago
Alternatives and similar repositories for chrome_abe_poc:
Users that are interested in chrome_abe_poc are comparing it to the libraries listed below
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆18Updated 6 months ago
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆21Updated 3 months ago
- Near compile-time string obfuscation for Golang☆13Updated last year
- Ransomware written in go, encrypt - decrypt.☆16Updated 7 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆43Updated 11 months ago
- Chrome COOKIE v20 decryption PoC☆57Updated 3 months ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆33Updated 2 years ago
- A nice process dumping tool☆78Updated 2 years ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal console builder.☆37Updated 5 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆69Updated last month
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆19Updated 6 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆18Updated 2 weeks ago
- Windows C++ Implant for Exploration C2☆25Updated last week
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆64Updated this week
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆85Updated 8 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆45Updated 9 months ago
- ☆21Updated 4 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated 11 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 5 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆10Updated 6 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆50Updated 3 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆68Updated last year
- Sleep Obfuscation☆43Updated 2 years ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆41Updated 7 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆66Updated last year
- Go Shellcode Loader to be Integrated in Exploration C2☆25Updated 2 weeks ago
- Change hash for a signed pe☆15Updated last year
- Mockingjay Process Injection Vulnerable DLL Finder☆19Updated last year