githubesson / chrome_abe_pocLinks
golang decryption poc of the new app bound encryption introduced in chrome version 127.
☆22Updated last year
Alternatives and similar repositories for chrome_abe_poc
Users that are interested in chrome_abe_poc are comparing it to the libraries listed below
Sorting:
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆21Updated last year
- HardwareTurningPoint, Fully Go Compatible Hardware Breakpoint☆17Updated last year
- Troll TaskManager, and play with it .☆30Updated 6 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆50Updated 8 months ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆83Updated 4 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆22Updated 9 months ago
- A unique introduction to native runtime obfuscation.☆74Updated 11 months ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Updated 9 months ago
- Chrome COOKIE v20 decryption PoC☆224Updated 7 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 9 months ago
- A mutliple tactics to execute shellcode in go :}☆23Updated 9 months ago
- Decrypting yandex browser passwords☆27Updated 9 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆81Updated 7 months ago
- Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan …☆200Updated last month
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆166Updated 8 months ago
- Utilizing DLang For Offensive Operations.☆14Updated 8 months ago
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆190Updated last month
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Updated 3 years ago
- A malware-analysis tool that identify the exact position and details of malicious content in binary files using external Anti-Virus scann…☆38Updated 2 years ago
- UAC Bypass using UIAccess program QuickAssist☆206Updated 2 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27Updated 8 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆89Updated 5 months ago
- find dll base addresses without PEB WALK☆156Updated 6 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆195Updated last month
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆264Updated 7 months ago
- This project will guide yout to awareness of injection in almost every window API and process.☆24Updated 3 years ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆20Updated 3 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆18Updated 8 months ago
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆224Updated 4 months ago