lem0nSec / KBlastLinks
Basic interactive Windows kernel offensive toolkit written in C
☆133Updated 3 months ago
Alternatives and similar repositories for KBlast
Users that are interested in KBlast are comparing it to the libraries listed below
Sorting:
- Create Anti-Copy DRM Malware☆69Updated last year
- ☆151Updated 2 years ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆166Updated last year
- ☆146Updated last year
- Terminate AV/EDR leveraging BYOVD attack☆102Updated 9 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 2 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆100Updated last year
- random code snippets, useful for getting started☆123Updated 3 weeks ago
- Do some DLL SideLoading magic☆89Updated 2 years ago
- ApexLdr is a DLL Payload Loader written in C☆115Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆118Updated 5 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆100Updated 2 years ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆85Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- ☆122Updated 2 years ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 8 months ago
- Bypass LSA protection using the BYODLL technique☆170Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆85Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- ☆159Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆183Updated 2 years ago
- ☆127Updated last year
- Port of Cobalt Strike's Process Inject Kit☆189Updated last year
- ☆122Updated 9 months ago
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆41Updated last year
- A bunch of scripts and code i wrote.☆145Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆160Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated last year
- TypeLib persistence technique☆138Updated last year
- Execute shellcode files with rundll32☆212Updated last year