souzomain / Packer
Packer is a compact, fast and crosss-platform serialization library for store data in a buffer
☆21Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Packer
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆24Updated 10 months ago
- ☆27Updated 4 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆39Updated 10 months ago
- In-memory hiding technique☆43Updated 5 months ago
- Get your data from the resource section manually, with no need for windows apis☆53Updated 3 weeks ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- ☆26Updated 2 years ago
- ☆12Updated last year
- ☆21Updated 6 months ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆42Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆33Updated 3 years ago
- ☆22Updated last year
- ☆48Updated last year
- API Hammering with C++20☆34Updated 2 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆20Updated 2 years ago
- ☆12Updated last year
- A PoC tool for exploiting leaked process and thread handles☆30Updated 8 months ago
- ☆20Updated 2 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆42Updated 8 months ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆16Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆38Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆35Updated 2 months ago
- Windows AppLocker Driver (appid.sys) LPE☆35Updated 3 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆30Updated 2 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆30Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆26Updated 2 years ago