sinloss / EQGRPLinks
A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP
☆25Updated 6 years ago
Alternatives and similar repositories for EQGRP
Users that are interested in EQGRP are comparing it to the libraries listed below
Sorting:
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated last year
- using the gpu to hide your payload☆59Updated 3 years ago
- A command and control (C2) server☆57Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- ☆37Updated 5 months ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated 11 months ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆58Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated last year
- ☆37Updated 2 years ago
- Golang bindings for PE-sieve☆42Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated last year
- a small wiper malware programmed in c#☆58Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Attacking the cleanup_module function of a kernel module☆41Updated 2 months ago
- ☆27Updated 9 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- Linux Sleep Obfuscation☆105Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 8 months ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆15Updated last year
- WinRAR 0day CVE-2025-8088 PoC RAR Archive☆38Updated 2 weeks ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- A PoC for achieving persistence via push notifications on Windows☆47Updated 2 years ago
- ☆25Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆65Updated 3 years ago
- Identifies metadata of .NET binary files.☆21Updated last year