hoodoer / ENNEoS
Evolutionary Neural Network Encoder of Shenanigans. Obfuscating shellcode with an encoder that uses genetic algorithms to evolve neural networks to contain and output the shellcode on demand.
☆23Updated 5 years ago
Alternatives and similar repositories for ENNEoS
Users that are interested in ENNEoS are comparing it to the libraries listed below
Sorting:
- Kernel mode windows NT API logger☆22Updated 5 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- ☆16Updated 4 years ago
- A python metamorphic engine for PE/PE+ files.☆15Updated 2 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- ☆13Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- The exploit for Panda AV LPE☆37Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22Updated 5 years ago
- ACTIVELabs Security Advisories☆23Updated 3 years ago
- ☆13Updated 8 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆22Updated 5 years ago
- A windbg extension for ASLR/DEP/SafeSEH check☆25Updated 6 years ago
- ☆45Updated 6 years ago
- ☆51Updated 8 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Self-Loading Registration Free COM Functions☆11Updated 5 years ago
- Windows Inline function hooking library targeted at MSVC☆27Updated 8 years ago
- fragments of dirty, and quick code. possible error checking or none.☆24Updated 7 years ago
- ☆33Updated 7 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 6 years ago
- Shellcode injection using debugging APIs☆19Updated 11 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆18Updated 8 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago