zerosum0x0-archive / archive
☆55Updated 3 years ago
Alternatives and similar repositories for archive:
Users that are interested in archive are comparing it to the libraries listed below
- ☆33Updated 2 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆36Updated 3 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- using the gpu to hide your payload☆57Updated 2 years ago
- Experiment on reproducing Obfuscate & Sleep☆144Updated 4 years ago
- ☆196Updated 4 years ago
- Deleting Shadow Copies In Pure C++☆114Updated 2 years ago
- It's pointy and it hurts!☆125Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆61Updated 2 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Updated 3 years ago
- ☆37Updated last month
- Enabled / Disable LSA Protection via BYOVD☆67Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- ☆42Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆73Updated last year
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- From directory deletion to SYSTEM shell☆112Updated 5 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆156Updated 4 years ago
- D/Invoke implementation in Nim☆101Updated 2 years ago
- Red Team Operator: Malware Development Essentials Course☆98Updated 4 years ago
- Bypass Malware Time Delays☆101Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- ☆29Updated 2 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆32Updated 2 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆101Updated 2 years ago