PoC arbitrary WPM without a process handle
☆20Jul 22, 2023Updated 2 years ago
Alternatives and similar repositories for SilentWrite
Users that are interested in SilentWrite are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 3 years ago
- Splitting and executing shellcode across multiple pages☆104Jun 8, 2023Updated 2 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 3 years ago
- Azure APIs enumeration and abuse☆12Feb 26, 2026Updated 2 months ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆30Jan 22, 2025Updated last year
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- GoLang script that checks for password leaks by sending email address to the BreachDirectory API☆12Nov 3, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Farm-to-table, organic, handcrafted, delicious Webassembly☆15Dec 7, 2021Updated 4 years ago
- Use COM Component Bypass UAC,Dll Version☆36Apr 17, 2021Updated 5 years ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated 2 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- vulnerable drivers for windows machines.☆59Apr 17, 2026Updated 2 weeks ago
- Indirect NT syscalls LSASS dumper.☆47Jul 9, 2023Updated 2 years ago
- Simple single file header for creating zero imports drivers. Can be useful for bypassing forensic memory analysis performed by anticheats…☆22Jun 10, 2025Updated 10 months ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 9 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆24Nov 23, 2022Updated 3 years ago
- BOF内存运行exe☆32Jun 19, 2023Updated 2 years ago
- The code I write in my blog☆94Feb 21, 2026Updated 2 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- C implementation of TOTP to generate 2FA code like Google Authentificator.☆21Jun 15, 2021Updated 4 years ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- ☆85Feb 12, 2026Updated 2 months ago
- A tool used the Sleep Obfuscation and Memory encrypt technique to evade the anti-virus.A Proof of Concept,only used for study purpose.☆40Aug 29, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Beacon Object File (BOF) implementation of the 'cat' command☆27Feb 11, 2023Updated 3 years ago
- A .NET malware loader, using API-Hashing to evade static analysis☆209May 30, 2023Updated 2 years ago
- A PoC implementation for dynamically masking call stacks with timers.☆310Feb 13, 2023Updated 3 years ago
- MIRAI botnet in python3☆19Jun 18, 2019Updated 6 years ago
- ☆142Jun 21, 2023Updated 2 years ago
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated last year
- Thanks to @d35ha☆13Aug 16, 2021Updated 4 years ago