voidvxvt / HellBunnyLinks
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
☆111Updated 6 months ago
Alternatives and similar repositories for HellBunny
Users that are interested in HellBunny are comparing it to the libraries listed below
Sorting:
- Stage 0☆161Updated 7 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆185Updated 5 months ago
- A Mythic agent for Windows written in C☆130Updated 3 weeks ago
- Sleep obfuscation☆229Updated 7 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆129Updated 3 weeks ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆72Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆188Updated 7 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆222Updated 5 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆168Updated 4 months ago
- Activation Context Hijack☆155Updated 7 months ago
- .NET assembly loader with patchless AMSI and ETW bypass in Rust☆51Updated 9 months ago
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆178Updated last week
- A Mythic Agent written in PIC C.☆192Updated 5 months ago
- Bypass LSA protection using the BYODLL technique☆165Updated 9 months ago
- Injecting DLL into LSASS at boot☆129Updated 2 months ago
- ☆113Updated 4 months ago
- Code execution/injection technique using DLL PEB module structure manipulation☆129Updated last month
- ☆143Updated 8 months ago
- Convert your shellcode into an ASCII string☆96Updated 3 weeks ago
- Adversary Emulation Framework☆120Updated 2 weeks ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆99Updated 3 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆75Updated 11 months ago
- Shellcode loader☆89Updated 7 months ago
- early cascade injection PoC based on Outflanks blog post☆221Updated 8 months ago
- Ghosting-AMSI☆205Updated 2 months ago
- Impersonate Tokens using only NTAPI functions☆77Updated 3 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆70Updated last week
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆161Updated last year