souzomain / Packer
Packer is a compact, fast and crosss-platform serialization library for store data in a buffer
☆21Updated last year
Alternatives and similar repositories for Packer:
Users that are interested in Packer are comparing it to the libraries listed below
- ☆38Updated 2 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆46Updated last year
- AIDA64DRIVER Elevation of Privilege Vulnerability☆13Updated 6 months ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆26Updated last year
- In-memory hiding technique☆49Updated 3 months ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆41Updated last year
- ☆12Updated last year
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆12Updated 6 months ago
- ☆21Updated 11 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- ☆53Updated 2 years ago
- ☆27Updated 3 months ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated last month
- ☆13Updated 2 years ago
- Load and execute a common object file format (COFF) in the current process☆28Updated last year
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆26Updated last year
- API Hammering with C++20☆46Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆27Updated 8 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- run process as PPL Antimalware☆10Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 7 months ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆38Updated 3 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆34Updated 3 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 3 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.