rad9800 / BloatedHammer
API Hammering with C++20
☆34Updated 2 years ago
Related projects: ⓘ
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- ☆24Updated this week
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆31Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- ☆38Updated this week
- ☆33Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆34Updated 9 months ago
- Hooked create process injection for meterpreter☆23Updated 3 years ago
- ☆50Updated this week
- This is my own implementation of the Perun's Fart technique by Sektor7☆64Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆28Updated 2 years ago
- idk man this was the default github name☆35Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆50Updated last year
- ☆38Updated 11 months ago
- miscellaneous codes☆35Updated 11 months ago
- ☆36Updated 3 years ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆18Updated last year
- Just another Process Injection using Process Hollowing technique.☆16Updated last year
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆53Updated 2 years ago
- Get your data from the resource section manually, with no need for windows apis☆52Updated last year
- the Open Source and Pure C++ Packer for eXecutables☆18Updated last year
- A simple PE loader.☆25Updated last year
- ☆12Updated last year
- Self Delete DLL☆23Updated 7 months ago
- ☆73Updated this week
- Remove API hooks from a Beacon process.☆12Updated 3 years ago
- ☆43Updated this week
- Reimplementation of the KExecDD DSE bypass technique.☆42Updated last week
- ☆26Updated 2 months ago