Reimplementation of the KExecDD DSE bypass technique.
☆58Sep 7, 2024Updated last year
Alternatives and similar repositories for Dsebler
Users that are interested in Dsebler are comparing it to the libraries listed below
Sorting:
- Admin to Kernel code execution using the KSecDD driver☆265Apr 19, 2024Updated last year
- Basic interactive Windows kernel offensive toolkit written in C☆137Sep 20, 2025Updated 5 months ago
- ☆64May 31, 2024Updated last year
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- My implementation of Halo's Gate technique in C#☆54Apr 20, 2022Updated 3 years ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆110Mar 25, 2024Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆248Sep 8, 2024Updated last year
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Apr 13, 2023Updated 2 years ago
- In-memory hiding technique☆63Jan 5, 2025Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Feb 11, 2024Updated 2 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- This repo contains EXPs about Vulnerable Windows Driver☆47May 22, 2024Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- ☆216Mar 26, 2024Updated last year
- page table manipulation to gain physical r/w☆44May 7, 2024Updated last year
- using wnbios64.sys for arbitrary r/w☆15Oct 12, 2025Updated 4 months ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆169May 30, 2024Updated last year
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆28Sep 12, 2024Updated last year
- Use hardware breakpoint to dynamically change SSN in run-time☆279Apr 10, 2024Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- Win32 keylogger that supports all (non-ime using) languages correctly☆53Dec 21, 2023Updated 2 years ago
- ☆193Jul 29, 2024Updated last year
- Reverse engineering winapi function loadlibrary.☆233Apr 17, 2023Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆368Apr 19, 2023Updated 2 years ago
- MacOS Shared Library to Shellcode Loader☆54Feb 23, 2026Updated last week
- Process Injection using Thread Name☆299Apr 18, 2025Updated 10 months ago
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- Halos Gate-based NTAPI Unhooker☆52Apr 21, 2022Updated 3 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated 10 months ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 10 months ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated last month
- ☆201May 29, 2024Updated last year
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago