Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies
☆122May 29, 2024Updated last year
Alternatives and similar repositories for Embedder
Users that are interested in Embedder are comparing it to the libraries listed below
Sorting:
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Local & remote Windows DLL Proxying☆169Jun 17, 2024Updated last year
- ☆101Oct 7, 2023Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆281Sep 18, 2024Updated last year
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆409Jan 11, 2026Updated last month
- A BOF that runs unmanaged PEs inline☆680Oct 23, 2024Updated last year
- ☆53Sep 23, 2025Updated 5 months ago
- a tool to help operate in EDRs' blind spots☆767Dec 2, 2024Updated last year
- Inject DLLs into the explorer process using icons☆408May 18, 2025Updated 9 months ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145May 18, 2024Updated last year
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆539Feb 13, 2024Updated 2 years ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆232Feb 12, 2025Updated last year
- Analyse your malware to surgically obfuscate it☆519Dec 17, 2025Updated 2 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- ROP-based sleep obfuscation to evade memory scanners☆376Jun 22, 2025Updated 8 months ago
- Sleep obfuscation☆268Dec 13, 2024Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- Extracting NetNTLM without touching lsass.exe☆243Nov 27, 2023Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆434Dec 21, 2023Updated 2 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆307Dec 9, 2023Updated 2 years ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- Library of BOFs to interact with SQL servers☆223Dec 3, 2025Updated 2 months ago
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- Load a dynamic library from memory by modifying the native Windows loader☆285Jun 18, 2025Updated 8 months ago
- A Mythic Agent written in PIC C.☆207Feb 4, 2025Updated last year
- ☆121Nov 21, 2024Updated last year
- ☆126Sep 1, 2024Updated last year
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆443Jul 8, 2024Updated last year
- AV bypass while you sip your Chai!☆224May 17, 2024Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.☆120May 22, 2025Updated 9 months ago
- ☆46Jun 21, 2023Updated 2 years ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆407Sep 12, 2023Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Decrypt GlobalProtect configuration and cookie files.☆158Sep 10, 2024Updated last year