Dll injection through code page id modification in registry. Based on jonas lykk research
☆17Jun 18, 2022Updated 3 years ago
Alternatives and similar repositories for NlsCodeInjectionThroughRegistry
Users that are interested in NlsCodeInjectionThroughRegistry are comparing it to the libraries listed below
Sorting:
- ☆14Dec 26, 2024Updated last year
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆53Jan 29, 2015Updated 11 years ago
- ☆17May 7, 2025Updated 10 months ago
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- A COFF Loader written in Rust☆140Dec 1, 2025Updated 3 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 4 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- Mentally ill EtwTi parser☆69Jan 11, 2026Updated 2 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- GoLang sys全端口扫描☆13Jan 25, 2022Updated 4 years ago
- Kernel module that allows hiding files in any filesystem☆24Dec 20, 2024Updated last year
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- Library of BOFs to interact with SQL servers☆23Apr 9, 2025Updated 11 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- Windows rootkit designed to work with BYOVD exploits☆217Jan 18, 2025Updated last year
- Position-independent Reflective Loader for macOS☆119Feb 19, 2026Updated last month
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- ☆12Feb 4, 2025Updated last year
- ☆61Oct 24, 2025Updated 4 months ago
- A set of programs for analyzing common vulnerabilities in COM☆249Sep 8, 2024Updated last year
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆314Feb 16, 2026Updated last month
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 4 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆61Oct 19, 2024Updated last year
- Collection of red team techniques.☆69Apr 25, 2025Updated 10 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 8 months ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- An example reference design for a proposed BOF PE☆202Jan 23, 2026Updated last month
- ☆31Feb 28, 2025Updated last year
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 3 months ago