souzomain / PackerLinks
Packer is a compact, fast and crosss-platform serialization library for store data in a buffer
☆22Updated last year
Alternatives and similar repositories for Packer
Users that are interested in Packer are comparing it to the libraries listed below
Sorting:
- ☆54Updated 2 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆34Updated 3 years ago
- ☆17Updated 4 years ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆26Updated last year
- A lexer and parser for Sleep☆20Updated last month
- ☆26Updated 3 years ago
- ☆12Updated last year
- run process as PPL Antimalware☆10Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆50Updated last year
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- ☆31Updated 2 months ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Updated last year
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆23Updated 5 years ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆12Updated 8 months ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆22Updated 2 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆16Updated 3 months ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆13Updated 8 months ago
- A simple Nim stager (w/ fiber execution)☆18Updated 3 years ago
- In-memory hiding technique☆54Updated 5 months ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated 3 months ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- A console obfuscator for .NET assemblies.☆10Updated 2 years ago
- ☆21Updated last year
- Ntdll Unhooking POC☆19Updated 2 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 3 years ago
- ☆17Updated 10 months ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆30Updated 3 years ago
- Load a dynamic library from memory using a fuse mount☆31Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆30Updated 3 weeks ago