Find jmp gadgets for call stack spoofing.
☆75Oct 1, 2025Updated 5 months ago
Alternatives and similar repositories for GadgetHunter
Users that are interested in GadgetHunter are comparing it to the libraries listed below
Sorting:
- A pointer encryption library intended for Red Team implant design in Rust.☆66Oct 1, 2025Updated 5 months ago
- A different approach to writing BOFs in rust.☆19Aug 20, 2025Updated 6 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆87Apr 26, 2025Updated 10 months ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆102Jun 16, 2024Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 9 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- A runtime for developing large-scale and complex shellcode.☆22Feb 15, 2026Updated 2 weeks ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- Arsenal of modules to beacon postex☆94Feb 18, 2026Updated 2 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆197Nov 4, 2025Updated 4 months ago
- Sleep Obfuscation in Rust☆279Dec 1, 2025Updated 3 months ago
- ☆61Oct 24, 2025Updated 4 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 7 months ago
- Crystal Palace library for proxying Nt API calls via the Threadpool☆100Oct 18, 2025Updated 4 months ago
- ☆36Feb 12, 2026Updated 3 weeks ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- BOF with Synthetic Stackframe☆230Oct 30, 2025Updated 4 months ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆138Jul 2, 2025Updated 8 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- Activation Context Hijack☆170Aug 3, 2025Updated 7 months ago
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆38Feb 19, 2026Updated 2 weeks ago
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 4 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆30Feb 19, 2026Updated 2 weeks ago
- Things i do because i saw it on twitter on a weekend☆57Jul 20, 2025Updated 7 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆93Jul 7, 2025Updated 7 months ago
- ☆64Dec 19, 2024Updated last year
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- ☆43Jun 1, 2025Updated 9 months ago
- List of tools to use in the Advance Red Team Operations course from White Knight Labs☆14Dec 22, 2024Updated last year
- Awesome MalDev Links☆39Updated this week
- ☆48Dec 5, 2025Updated 3 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆128Jan 28, 2026Updated last month
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 2 months ago
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆264Aug 31, 2025Updated 6 months ago