ntdll0 / HVNCLinks
My POC implementation of HVNC (Hidden VNC / Hidden Desktop)
☆27Updated 11 months ago
Alternatives and similar repositories for HVNC
Users that are interested in HVNC are comparing it to the libraries listed below
Sorting:
- Yandex browser passwords and credit-cards decryption algorithm☆21Updated 8 months ago
- Decrypting yandex browser passwords☆27Updated 8 months ago
- A unique introduction to native runtime obfuscation.☆74Updated 9 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆20Updated last month
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆106Updated last month
- Troll TaskManager, and play with it .☆29Updated 4 months ago
- kernel-mode DLL Injector☆119Updated 7 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆79Updated 2 months ago
- Injecting DLL into LSASS at boot☆154Updated 7 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆166Updated last year
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27Updated 7 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆182Updated 2 years ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆132Updated 11 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆195Updated 3 months ago
- EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.☆46Updated 3 weeks ago
- ☆39Updated last year
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆164Updated 2 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆99Updated last year
- Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan …☆126Updated last week
- Fud Runpe Av Evasion / All Av Bypass☆32Updated 2 years ago
- Generic PE loader for fast prototyping evasion techniques☆240Updated last year
- The best powershell obfuscator ever made☆119Updated 4 months ago
- Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulati…☆91Updated last month
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆290Updated last year
- Dynamic shellcode loader with sophisticated evasion capabilities☆269Updated 2 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆102Updated 9 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆74Updated last year
- A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering t…☆102Updated 11 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago