synacktiv / keebcap
Win32 keylogger that supports all (non-ime using) languages correctly
☆49Updated last year
Alternatives and similar repositories for keebcap:
Users that are interested in keebcap are comparing it to the libraries listed below
- ForsHops☆41Updated 3 weeks ago
- ☆61Updated 10 months ago
- ☆98Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆65Updated 5 months ago
- ☆42Updated 2 years ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆48Updated 3 months ago
- shell code example☆34Updated this week
- ☆86Updated 8 months ago
- ☆54Updated 3 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆73Updated 3 months ago
- Shellcode Loader Utilizing ETW Events☆63Updated last month
- I have documented all of the AMSI patches that I learned till now☆71Updated 3 weeks ago
- ☆29Updated 4 months ago
- ☆84Updated 10 months ago
- stack spoofing☆83Updated 5 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆90Updated 10 months ago
- ☆127Updated 7 months ago
- Splitting and executing shellcode across multiple pages☆100Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆113Updated 2 months ago
- ☆103Updated 3 months ago
- ☆135Updated last year
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆130Updated 8 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆76Updated last month
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆18Updated 11 months ago
- Execute dotnet app from unmanaged process☆72Updated 3 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆63Updated 3 months ago
- Section-based payload obfuscation technique for x64☆59Updated 8 months ago
- List the ETW provider(s) in the registration table of a process.☆58Updated last year