A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack
☆99Dec 22, 2025Updated 2 months ago
Alternatives and similar repositories for ThreadPoolExecChain
Users that are interested in ThreadPoolExecChain are comparing it to the libraries listed below
Sorting:
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 9 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 8 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Jan 5, 2026Updated last month
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Using Chromium-based browsers as a proxy for C2 traffic.☆143Dec 6, 2025Updated 2 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Translate virtual addresses to physical addresses from usermode.☆103Jun 7, 2024Updated last year
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 2 months ago
- Cobalt Strike BOF☆42Dec 10, 2025Updated 2 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆96Mar 20, 2023Updated 2 years ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- ☆61Oct 24, 2025Updated 4 months ago
- Reflective DLL self-loading as a library☆21May 3, 2025Updated 9 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆128Jan 28, 2026Updated 3 weeks ago
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆65Updated this week
- An example reference design for a proposed BOF PE☆197Jan 23, 2026Updated last month
- Process injection alternative☆406Sep 6, 2024Updated last year
- AppLocker-Based EDR Neutralization☆321Dec 19, 2025Updated 2 months ago
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnos…☆43Jan 15, 2026Updated last month
- Rainbow table generation & lookup tools.☆31Dec 17, 2025Updated 2 months ago
- Mentally ill EtwTi parser☆68Jan 11, 2026Updated last month
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆210Aug 21, 2025Updated 6 months ago
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆68Nov 15, 2025Updated 3 months ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Apr 24, 2025Updated 10 months ago
- AV/EDR killer using BYOVD technique☆43Sep 27, 2024Updated last year
- A set of LLVM and GCC based plugins that perform code obfuscation.☆139Oct 20, 2025Updated 4 months ago
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆616Oct 27, 2025Updated 4 months ago
- .data ptr swapper for newer win32k versions. (Supports Windows 11)☆36Jan 19, 2026Updated last month
- LPE / RCE Exploits for various vulnerable "Bloatware" products☆84Aug 5, 2025Updated 6 months ago
- Sleep obfuscation☆268Dec 13, 2024Updated last year
- ☆31Feb 28, 2025Updated 11 months ago
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆66Dec 15, 2025Updated 2 months ago
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆261Oct 16, 2024Updated last year
- Windows rootkit designed to work with BYOVD exploits☆216Jan 18, 2025Updated last year
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 4 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated last month
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆539Feb 13, 2024Updated 2 years ago
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆235Feb 20, 2026Updated last week
- A runtime for developing large-scale and complex shellcode.☆22Feb 15, 2026Updated last week