voidvxvt / HellBunny
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
☆98Updated 3 months ago
Alternatives and similar repositories for HellBunny:
Users that are interested in HellBunny are comparing it to the libraries listed below
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- Stage 0☆154Updated 3 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆171Updated last month
- Sleep obfuscation☆212Updated 3 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 7 months ago
- A Mythic agent for Windows written in C☆104Updated this week
- BOF with Synthetic Stackframe☆137Updated last month
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆150Updated 2 weeks ago
- ☆148Updated 8 months ago
- Shellcode loader☆78Updated 4 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆60Updated 9 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆118Updated 5 months ago
- ForsHops☆87Updated last week
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆72Updated last month
- ☆102Updated 2 weeks ago
- ☆105Updated 2 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆90Updated 9 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆107Updated last year
- Port of Cobalt Strike's Process Inject Kit☆171Updated 4 months ago
- Bypass LSA protection using the BYODLL technique☆154Updated 6 months ago
- "Service-less" driver loading☆150Updated 4 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- TypeLib persistence technique☆109Updated 5 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆73Updated last month
- A BOF to enumerate system process, their protection levels, and more.☆115Updated 4 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆184Updated 4 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆60Updated last year
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆133Updated last week
- Leverage WindowsApp createdump tool to obtain an lsass dump☆147Updated 6 months ago