ntdll0 / HVNCLinks
My POC implementation of HVNC (Hidden VNC / Hidden Desktop)
☆28Updated last year
Alternatives and similar repositories for HVNC
Users that are interested in HVNC are comparing it to the libraries listed below
Sorting:
- Yandex browser passwords and credit-cards decryption algorithm☆21Updated 9 months ago
- A unique introduction to native runtime obfuscation.☆74Updated 10 months ago
- Decrypting yandex browser passwords☆28Updated 9 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆20Updated 2 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆107Updated 2 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆103Updated 10 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆201Updated 4 months ago
- Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulati…☆93Updated 2 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆74Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆101Updated last year
- Troll TaskManager, and play with it .☆29Updated 5 months ago
- EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.☆47Updated last month
- Injecting DLL into LSASS at boot☆156Updated 8 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆166Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- Shellcode loader☆97Updated last year
- TypeLib persistence technique☆138Updated last year
- ☆52Updated last year
- Fud Runpe Av Evasion / All Av Bypass☆32Updated 2 years ago
- BOF with Synthetic Stackframe☆206Updated 2 months ago
- kernel-mode DLL Injector☆123Updated 8 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆19Updated last year
- Malware?☆76Updated 2 months ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆28Updated last year
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 2 months ago
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆91Updated 2 weeks ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆36Updated 3 weeks ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆88Updated 4 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆165Updated 7 months ago