sinloss / EQGRPLinks
A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP
☆25Updated 6 years ago
Alternatives and similar repositories for EQGRP
Users that are interested in EQGRP are comparing it to the libraries listed below
Sorting:
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 8 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆84Updated last year
- XOR-based shellcode encoder☆31Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 5 months ago
- using the gpu to hide your payload☆59Updated 3 years ago
- ☆37Updated 6 months ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆60Updated last week
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆34Updated last year
- ☆16Updated 4 months ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆15Updated last year
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 3 years ago
- ☆18Updated 3 months ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated last year
- WinRAR 0day CVE-2025-8088 PoC RAR Archive☆42Updated last month
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- ☆27Updated 9 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- ☆29Updated last year
- API Hammering with C++20☆49Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆66Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated last year
- Linux Sleep Obfuscation☆106Updated last year