kyleavery / pendulumLinks
Linux Sleep Obfuscation
☆105Updated last year
Alternatives and similar repositories for pendulum
Users that are interested in pendulum are comparing it to the libraries listed below
Sorting:
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 7 months ago
- A work in progress BOF/COFF loader in Rust☆51Updated 2 years ago
- ☆57Updated 10 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆24Updated last year
- ☆100Updated last year
- Select any exported function in a dll as the new dll's entry point.☆81Updated 10 months ago
- ☆35Updated 4 months ago
- An In-memory Embedding of CPython☆30Updated 4 years ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆55Updated this week
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- various methods of making API calls☆19Updated 6 months ago
- Windows AppLocker Driver (appid.sys) LPE☆63Updated last year
- A more reliable way of resolving syscall numbers in Windows☆53Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- ☆29Updated last year
- ☆47Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- Template-based generation of shellcode loaders☆79Updated last year
- Mythic C2 Agent written in x64 PIC C☆82Updated 6 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- BOF to decrypt Signal Desktop chat logs☆66Updated 6 months ago
- Load and execute a common object file format (COFF) in the current process☆30Updated last year
- BOF for C2 framework☆42Updated 9 months ago
- EvtPsst☆55Updated last year
- A process injection technique using only thread context manipulation☆37Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆61Updated 6 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆40Updated 2 years ago
- ☆37Updated 2 years ago