Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution
☆44Oct 11, 2025Updated 6 months ago
Alternatives and similar repositories for SentinelBruh
Users that are interested in SentinelBruh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 5 months ago
- ☆108Aug 21, 2024Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆61Mar 17, 2025Updated last year
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆303Jul 31, 2024Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆139Aug 31, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆284Sep 18, 2024Updated last year
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- ☆139Jan 16, 2025Updated last year
- PhantomsGate: Advanced Shellcode Injection Technique☆29Jul 15, 2024Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 8 months ago
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 11 months ago
- ☆127Sep 1, 2024Updated last year
- One-header configurable C++20 COFF loader☆20Jul 21, 2025Updated 9 months ago
- TypeLib persistence technique☆143Oct 22, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆132Nov 17, 2025Updated 5 months ago
- Evasive shellcode loader☆401Oct 17, 2024Updated last year
- Small driver that uses alternative syscalls feature☆18May 9, 2024Updated last year
- Mentally ill EtwTi parser☆70Jan 11, 2026Updated 3 months ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 2 months ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- A reflective DLL development template for the Rust programming language☆119Nov 4, 2025Updated 5 months ago
- Hotkey-based keylogger for Windows☆33Oct 17, 2024Updated last year
- ☆59Feb 19, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- ☆20Jan 8, 2026Updated 3 months ago
- Process Injection using Thread Name☆308Apr 18, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post☆241Nov 7, 2024Updated last year
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆55Dec 30, 2025Updated 4 months ago
- Utilizing DLang For Offensive Operations.☆15May 29, 2025Updated 11 months ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated 2 years ago
- Call Stack Spoofing for Rust☆216Jan 28, 2026Updated 3 months ago
- Evasion by machine code de-optimization.☆425Jul 22, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆53May 5, 2025Updated 11 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 3 years ago
- Beacon Object File (BOF) Template☆87Mar 9, 2026Updated last month
- Python3 utility for creating zip files that smuggle additional data for later extraction☆268May 15, 2025Updated 11 months ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- A high performance Nim implementation of a Cyclic Polynomial Hash, aka BuzHash, and the Rabin-Karp algorithm☆16Apr 2, 2019Updated 7 years ago
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆129Jul 5, 2024Updated last year