ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It provides a set of enumeration tools to identify security vulnerabilities, analyze system protections, and facilitate exploit development.
☆108Mar 10, 2025Updated last year
Alternatives and similar repositories for ZeroProbe
Users that are interested in ZeroProbe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆197Feb 6, 2025Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆317Mar 31, 2025Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- A different approach to writing BOFs in rust.☆21Aug 20, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- Reaping treasures from strings in remote processes memory☆286Feb 8, 2025Updated last year
- ☆19Sep 1, 2025Updated 8 months ago
- Your Skyfall Infrastructure Pack☆99Apr 10, 2026Updated 3 weeks ago
- Ghosting-AMSI☆236Apr 24, 2025Updated last year
- Sleep obfuscation☆274Dec 13, 2024Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆247Mar 9, 2026Updated last month
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆45Dec 7, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- early cascade injection PoC based on Outflanks blog post☆241Nov 7, 2024Updated last year
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆46Aug 16, 2024Updated last year
- Tool for viewing NTDS.dit☆199Mar 14, 2025Updated last year
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆144Apr 6, 2025Updated last year
- Yet another shellcode loader - but a sneaky one☆26Apr 16, 2025Updated last year
- BOF with Synthetic Stackframe☆244Oct 30, 2025Updated 6 months ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆432Sep 29, 2025Updated 7 months ago
- A PowerShell console in C/C++ with all the security features disabled☆386Oct 14, 2025Updated 6 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆45Jan 9, 2025Updated last year
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆100Dec 22, 2025Updated 4 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆204Apr 21, 2025Updated last year
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆233Apr 12, 2025Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- kernel callback removal (Bypassing EDR Detections)☆216Nov 14, 2025Updated 5 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆191Jan 17, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 8 months ago
- Windows rootkit designed to work with BYOVD exploits☆219Jan 18, 2025Updated last year
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆440Jun 27, 2025Updated 10 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆329Oct 20, 2025Updated 6 months ago
- Execute shellcode via Bluetooth device authentication☆41Feb 19, 2025Updated last year
- Collect Windows telemetry for Maldev☆475Updated this week