Reimplementation of the KExecDD DSE bypass technique.
☆61Sep 7, 2024Updated last year
Alternatives and similar repositories for Dsebler
Users that are interested in Dsebler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- ☆63May 31, 2024Updated last year
- Basic interactive Windows kernel offensive toolkit written in C☆136Sep 20, 2025Updated 6 months ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- using wnbios64.sys for arbitrary r/w☆15Oct 12, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- ☆206May 29, 2024Updated last year
- ☆194Jul 29, 2024Updated last year
- it's a driver injector or driver loader header lib(Windows)☆12Aug 5, 2023Updated 2 years ago
- My implementation of Halo's Gate technique in C#☆54Apr 20, 2022Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- ☆221Mar 26, 2024Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆252Sep 8, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated 2 years ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆110Mar 25, 2024Updated 2 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Mar 16, 2026Updated 3 weeks ago
- In-memory hiding technique☆63Jan 5, 2025Updated last year
- DSE & PG bypass via BYOVD attack☆79Jul 12, 2025Updated 9 months ago
- ☆32Jun 1, 2024Updated last year
- Use hardware breakpoint to dynamically change SSN in run-time☆281Apr 10, 2024Updated 2 years ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆127Sep 1, 2024Updated last year
- windows kernel pagehook☆42Oct 30, 2022Updated 3 years ago
- PoC kernel to usermode injection☆111Feb 26, 2024Updated 2 years ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated 2 months ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated last year
- Win32 keylogger that supports all (non-ime using) languages correctly☆53Dec 21, 2023Updated 2 years ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆170May 30, 2024Updated last year
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆375Apr 19, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A BOF to enumerate system process, their protection levels, and more.☆126Nov 27, 2024Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆23Aug 26, 2023Updated 2 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Feb 11, 2024Updated 2 years ago
- This repo contains EXPs about Vulnerable Windows Driver☆48May 22, 2024Updated last year
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 5 years ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆110Jan 17, 2024Updated 2 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆28Sep 12, 2024Updated last year