lem0nSec / KBlastLinks
Basic interactive Windows kernel offensive toolkit written in C
☆135Updated 4 months ago
Alternatives and similar repositories for KBlast
Users that are interested in KBlast are comparing it to the libraries listed below
Sorting:
- Create Anti-Copy DRM Malware☆71Updated last year
- ☆151Updated 2 years ago
- Do some DLL SideLoading magic☆89Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆167Updated last year
- ApexLdr is a DLL Payload Loader written in C☆116Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆102Updated last year
- random code snippets, useful for getting started☆123Updated 2 months ago
- ☆122Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆163Updated 2 years ago
- ☆147Updated last year
- Terminate AV/EDR leveraging BYOVD attack☆104Updated 10 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Updated 2 years ago
- Bypass LSA protection using the BYODLL technique☆171Updated last year
- ☆159Updated last year
- ☆122Updated 10 months ago
- A Mythic agent for Windows written in C☆156Updated this week
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆85Updated 2 years ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆121Updated 7 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated 2 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆125Updated 2 years ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆91Updated 9 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.