githubesson / chrome_abe_poc
golang decryption poc of the new app bound encryption introduced in chrome version 127.
☆20Updated 5 months ago
Alternatives and similar repositories for chrome_abe_poc:
Users that are interested in chrome_abe_poc are comparing it to the libraries listed below
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆21Updated 5 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆18Updated this week
- shellcode loader that uses indirect syscalls written in D Lang The loader bypasses user-mode hooks by resolving system calls manually fro…☆9Updated this week
- Near compile-time string obfuscation for Golang☆12Updated last year
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆20Updated this week
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆33Updated 3 years ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆9Updated this week
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- Chrome COOKIE v20 decryption PoC☆87Updated this week
- ☆23Updated 6 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆69Updated 3 months ago
- Change hash for a signed pe☆16Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆20Updated this week
- Execute shellcode via Bluetooth device authentication☆38Updated 2 months ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆17Updated this week
- A basic C2 framework written in C☆61Updated 9 months ago
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆65Updated 2 weeks ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal console builder.☆48Updated last week
- This project will guide yout to awareness of injection in almost every window API and process.☆25Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆37Updated 7 months ago
- A nice process dumping tool☆81Updated 2 years ago
- Windows C++ Implant for Exploration C2☆29Updated last month
- Load and execute a common object file format (COFF) in the current process☆28Updated last year
- PoC arbitrary WPM without a process handle☆18Updated last year
- Evasive loader to bypass static detection☆58Updated last year
- Mockingjay Process Injection Vulnerable DLL Finder☆19Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆102Updated last year
- Threadless shellcode injection tool☆63Updated 8 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 9 months ago
- ☆17Updated 8 months ago