sinloss / EQGRPLinks
A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP
☆25Updated 6 years ago
Alternatives and similar repositories for EQGRP
Users that are interested in EQGRP are comparing it to the libraries listed below
Sorting:
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated 2 years ago
- using the gpu to hide your payload☆63Updated 3 years ago
- ☆37Updated 7 months ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated last year
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆64Updated 2 years ago
- Quick test for CVE-2023-26025 behaviours☆12Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆28Updated 6 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Updated 2 years ago
- Golang bindings for PE-sieve☆42Updated last year
- ☆37Updated 2 years ago
- Attacking the cleanup_module function of a kernel module☆50Updated 4 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆67Updated 3 years ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆79Updated 3 years ago
- Linux Sleep Obfuscation☆105Updated last year
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- ☆57Updated 3 years ago
- Make an Linux Kernel rootkit visible again.☆59Updated 8 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆27Updated 2 years ago
- a small wiper malware programmed in c#☆58Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year