gwillgues / BPFDoor
BPFDoor Source Code. Originally found from Chinese Threat Actor Red Menshen
☆43Updated 2 years ago
Alternatives and similar repositories for BPFDoor:
Users that are interested in BPFDoor are comparing it to the libraries listed below
- Enabled / Disable LSA Protection via BYOVD☆65Updated 3 years ago
- Unpacker for donut shellcode☆11Updated 4 years ago
- Golang bindings for PE-sieve☆41Updated last year
- ☆80Updated 2 years ago
- Inter-Process Communication Mechanisms☆26Updated 4 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆30Updated last year
- Load a dynamic library from memory using a fuse mount☆30Updated last year
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆60Updated last year
- ☆13Updated 11 months ago
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆61Updated last year
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆28Updated 3 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- Titan: A crappy Reflective Loader written in C and assembly for Cobalt Strike. Redirects DNS Beacon over DoH☆44Updated 3 years ago
- A work in progress BOF/COFF loader in Rust☆46Updated last year
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- ☆84Updated 2 years ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- Source files for my posts☆15Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Injects shellcode into remote processes using direct syscalls☆74Updated 4 years ago
- ☆59Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆45Updated 2 years ago
- ☆42Updated last year
- the Open Source and Pure C++ Packer for eXecutables☆18Updated last year
- Loads a program into a memfd and runs it.☆12Updated 2 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆41Updated 2 years ago