jstrosch / sclauncher
A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode.
☆124Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for sclauncher
- ☆104Updated this week
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆109Updated 3 months ago
- Tools for analyzing EDR agents☆208Updated 4 months ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆193Updated last year
- A dynamic unpacking tool☆128Updated last year
- ☆103Updated 3 months ago
- Repository of Yara Rules☆88Updated 3 weeks ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Repository to publish your evasion techniques and contribute to the project☆134Updated 3 weeks ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆111Updated 2 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆324Updated 5 months ago
- ☆173Updated 3 months ago
- ☆152Updated 5 months ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆113Updated last year
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- Exploitation of process killer drivers☆186Updated last year
- Admin to Kernel code execution using the KSecDD driver☆237Updated 6 months ago
- Python tool to check rootkits in Windows kernel☆165Updated 3 months ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆99Updated last year
- Finding secrets in kernel and user memory☆113Updated last year
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆131Updated 10 months ago
- ☆95Updated last week
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆162Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆205Updated last month
- Use YARA rules on Time Travel Debugging traces☆85Updated last year
- ETW based POC to identify direct and indirect syscalls☆172Updated last year
- EDRSandblast-GodFault☆240Updated last year
- Powershell Linter☆46Updated last month
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆300Updated last year
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆159Updated last year