a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor
☆110Mar 25, 2024Updated last year
Alternatives and similar repositories for flower
Users that are interested in flower are comparing it to the libraries listed below
Sorting:
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- ☆101Oct 7, 2023Updated 2 years ago
- ☆126Sep 1, 2024Updated last year
- Admin to Kernel code execution using the KSecDD driver☆265Apr 19, 2024Updated last year
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆261Oct 16, 2024Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- EvtPsst☆55Oct 24, 2023Updated 2 years ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Sleep obfuscation☆268Dec 13, 2024Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Mar 6, 2024Updated last year
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆434Dec 21, 2023Updated 2 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- BOF with Synthetic Stackframe☆230Oct 30, 2025Updated 4 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆368Apr 19, 2023Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆409Jan 11, 2026Updated last month
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆190Mar 4, 2024Updated 2 years ago
- ☆274Jan 14, 2023Updated 3 years ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆204Dec 27, 2023Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- early cascade injection PoC based on Outflanks blog post☆237Nov 7, 2024Updated last year
- For when DLLMain is the only way☆424Oct 29, 2024Updated last year
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆541Feb 13, 2024Updated 2 years ago
- ☆121Nov 21, 2024Updated last year
- Malware?☆77Oct 26, 2025Updated 4 months ago
- ☆100Sep 1, 2024Updated last year
- "Service-less" driver loading☆184Nov 28, 2024Updated last year
- Mentally ill EtwTi parser☆68Jan 11, 2026Updated last month
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆225Jul 25, 2023Updated 2 years ago
- Host CLR and run .NET binaries using Rust☆151Dec 23, 2025Updated 2 months ago
- find dll base addresses without PEB WALK☆160Jul 13, 2025Updated 7 months ago
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- ROP-based sleep obfuscation to evade memory scanners☆376Jun 22, 2025Updated 8 months ago
- ☆64May 31, 2024Updated last year
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆144Mar 16, 2024Updated last year
- Linux Sleep Obfuscation☆112Jan 7, 2024Updated 2 years ago