Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution
☆44Oct 11, 2025Updated 7 months ago
Alternatives and similar repositories for SentinelBruh
Users that are interested in SentinelBruh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 6 months ago
- ☆109Aug 21, 2024Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆62Mar 17, 2025Updated last year
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆306Jul 31, 2024Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆140Aug 31, 2025Updated 8 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆286Sep 18, 2024Updated last year
- Dumping LSA secrets: a story about task decorrelation☆15Jul 9, 2024Updated last year
- ☆140Jan 16, 2025Updated last year
- PhantomsGate: Advanced Shellcode Injection Technique☆29Jul 15, 2024Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 8 months ago
- kASLR bypass technique on Intel CPUs.☆34May 18, 2025Updated last year
- ☆127Sep 1, 2024Updated last year
- One-header configurable C++20 COFF loader☆20Jul 21, 2025Updated 10 months ago
- TypeLib persistence technique☆145Oct 22, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆132Nov 17, 2025Updated 6 months ago
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- Small driver that uses alternative syscalls feature☆18May 9, 2024Updated 2 years ago
- Mentally ill EtwTi parser☆72Jan 11, 2026Updated 4 months ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 3 months ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- A reflective DLL development template for the Rust programming language☆119Nov 4, 2025Updated 6 months ago
- Hotkey-based keylogger for Windows☆33Oct 17, 2024Updated last year
- ☆59Feb 19, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- ☆20Jan 8, 2026Updated 4 months ago
- Process Injection using Thread Name☆309Apr 18, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post☆242Nov 7, 2024Updated last year
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆56Dec 30, 2025Updated 4 months ago
- Utilizing DLang For Offensive Operations.☆15May 29, 2025Updated 11 months ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated 2 years ago
- Call Stack Spoofing for Rust☆217Jan 28, 2026Updated 3 months ago
- Evasion by machine code de-optimization.☆426Jul 22, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆53May 5, 2025Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 3 years ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆270May 15, 2025Updated last year
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- A high performance Nim implementation of a Cyclic Polynomial Hash, aka BuzHash, and the Rabin-Karp algorithm☆16Apr 2, 2019Updated 7 years ago
- Beacon Object File (BOF) Template☆87Mar 9, 2026Updated 2 months ago
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆129Jul 5, 2024Updated last year