A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow
☆18Jun 26, 2025Updated 9 months ago
Alternatives and similar repositories for TrampoLatte
Users that are interested in TrampoLatte are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆54Oct 13, 2025Updated 5 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 8 months ago
- ☆14Jul 26, 2025Updated 8 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆169Sep 22, 2025Updated 6 months ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆51Nov 2, 2025Updated 4 months ago
- Utilizng an MCP Server to communicate with your C2☆88May 15, 2025Updated 10 months ago
- A Patchless AMSI Bypass Technique using VEH²☆32Jun 22, 2025Updated 9 months ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆67Feb 17, 2026Updated last month
- ☆51Nov 26, 2025Updated 4 months ago
- a BOF implementation of various registry persistence methods☆96Nov 11, 2025Updated 4 months ago
- reverse engineering random malwares☆22Mar 12, 2026Updated 2 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 10 months ago
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago
- Build sneaky & malicious LNK files.☆161Jul 16, 2025Updated 8 months ago
- Proof-of-Concept code snippets for a variety of different process injection techniques☆23Feb 2, 2023Updated 3 years ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆139Apr 6, 2025Updated 11 months ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆48Nov 9, 2025Updated 4 months ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆33Oct 3, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- TeamServer and Client of Exploration Command and Control Framework☆179Jan 6, 2026Updated 2 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated 3 months ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆70Jan 19, 2026Updated 2 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- ☆48Jul 30, 2025Updated 7 months ago
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- ☆20Nov 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- ☆50Jun 4, 2025Updated 9 months ago
- Tiny C header that allows easy hiding of WinAPI imports via PEB☆41Sep 1, 2025Updated 6 months ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆15Jan 10, 2026Updated 2 months ago
- Mentally ill EtwTi parser☆69Jan 11, 2026Updated 2 months ago
- .NET Obfuscator designed to protect applications from reverse-engineering through advanced code obfuscation techniques.☆15Dec 31, 2024Updated last year
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year