kyleavery / pendulumLinks
Linux Sleep Obfuscation
☆97Updated last year
Alternatives and similar repositories for pendulum
Users that are interested in pendulum are comparing it to the libraries listed below
Sorting:
- ☆99Updated last year
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- ☆29Updated last year
- Linker for Beacon Object Files☆70Updated this week
- An In-memory Embedding of CPython☆28Updated 4 years ago
- ☆48Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆37Updated 2 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆24Updated 9 months ago
- in-process powershell runner for BRC4☆45Updated last year
- ☆31Updated last month
- Section-based payload obfuscation technique for x64☆59Updated 9 months ago
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆49Updated 4 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- Sample Rust Hooking Engine☆36Updated last year
- Rust template/library for implementing your own COFF loader☆50Updated 4 months ago
- A process injection technique using only thread context manipulation☆38Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Sliver agent rewritten in C++☆44Updated 9 months ago
- Load a dynamic library from memory using a fuse mount☆31Updated last year
- ☆36Updated 2 years ago
- BOF for C2 framework☆41Updated 6 months ago
- BYOVD collection☆23Updated last year
- ☆86Updated 9 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 9 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆42Updated 10 months ago
- ☆37Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆59Updated 3 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 7 months ago