An x64 binary executing code that's not inside of it.
☆17Feb 28, 2023Updated 3 years ago
Alternatives and similar repositories for Fetch-n-Exec
Users that are interested in Fetch-n-Exec are comparing it to the libraries listed below
Sorting:
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- GoLang sys全端口扫描☆13Jan 25, 2022Updated 4 years ago
- ☆14Dec 26, 2024Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- Kernel module that allows hiding files in any filesystem☆24Dec 20, 2024Updated last year
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- ☆39May 31, 2024Updated last year
- AES-encrypted TCP/IP swiss army knife.☆11Nov 6, 2022Updated 3 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- SamrSearch can get user info and group info with MS-SAMR.☆15Feb 15, 2022Updated 4 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆30Feb 8, 2022Updated 4 years ago
- PoC arbitrary WPM without a process handle☆20Jul 22, 2023Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- Simple Intel VT-x type-2 hypervisor for 64-bit Linux.☆19Aug 18, 2020Updated 5 years ago
- Reverse text segment x64 ELF infector written in Assembly☆20Oct 16, 2021Updated 4 years ago
- A UNIX-like OS targeting AMD64 compatible processors☆18Mar 5, 2022Updated 4 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Dec 9, 2020Updated 5 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Mentally ill EtwTi parser☆69Jan 11, 2026Updated 2 months ago
- A COFF Loader written in Rust☆140Dec 1, 2025Updated 3 months ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆41Dec 31, 2020Updated 5 years ago
- 🦫 Hop server side SDK for Go☆12May 30, 2023Updated 2 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Travis builds for certbot.eff.org☆12Jan 19, 2022Updated 4 years ago
- AMD SVM hypervisor rootkit proof of concept☆49Sep 23, 2023Updated 2 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- Checklists☆16Sep 22, 2016Updated 9 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- An Python application for sending diagnostic frames over CAN-BUS to PSA/Stellantis based cars☆74Updated this week