Reimplementation of the KExecDD DSE bypass technique.
☆61Sep 7, 2024Updated last year
Alternatives and similar repositories for Dsebler
Users that are interested in Dsebler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Admin to Kernel code execution using the KSecDD driver☆269Apr 19, 2024Updated 2 years ago
- ☆63May 31, 2024Updated last year
- Basic interactive Windows kernel offensive toolkit written in C☆138Sep 20, 2025Updated 8 months ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- using wnbios64.sys for arbitrary r/w☆15Oct 12, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- ☆208May 29, 2024Updated last year
- ☆202Jul 29, 2024Updated last year
- it's a driver injector or driver loader header lib(Windows)☆13Aug 5, 2023Updated 2 years ago
- My implementation of Halo's Gate technique in C#☆55Apr 20, 2022Updated 4 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 3 years ago
- ☆221Mar 26, 2024Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆262Sep 8, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated 2 years ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆111Mar 25, 2024Updated 2 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Mar 16, 2026Updated 2 months ago
- In-memory hiding technique☆64Jan 5, 2025Updated last year
- DSE & PG bypass via BYOVD attack☆79Jul 12, 2025Updated 10 months ago
- ☆32Jun 1, 2024Updated last year
- Use hardware breakpoint to dynamically change SSN in run-time☆281Apr 10, 2024Updated 2 years ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆127Sep 1, 2024Updated last year
- windows kernel pagehook☆42Oct 30, 2022Updated 3 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated last year
- Abusing Azure services over C2☆372Jan 20, 2026Updated 4 months ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆54Dec 21, 2023Updated 2 years ago
- PoC kernel to usermode injection☆116Feb 26, 2024Updated 2 years ago
- List the ETW provider(s) in the registration table of a process.☆82Sep 20, 2023Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆381Apr 19, 2023Updated 3 years ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆173May 30, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A BOF to enumerate system process, their protection levels, and more.☆126Nov 27, 2024Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆23Aug 26, 2023Updated 2 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Feb 11, 2024Updated 2 years ago
- This repo contains EXPs about Vulnerable Windows Driver☆48May 22, 2024Updated 2 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 5 years ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆114Jan 17, 2024Updated 2 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆28Sep 12, 2024Updated last year