There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Elevator
UAC bypass by abusing RPC and debug objects.Shelter
ROP-based sleep obfuscation to evade memory scannersEPI
Threadless Process Injection through entry point hijacking.Split
Apply a divide and conquer approach to bypass EDRsLOLBITS
** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + Dinvoke for EDR user-mode hooking evasion.DInvoke_rs
Dynamically invoke arbitrary unmanaged code.Fiber
Using fibers to run in-memory code in a different and stealthy way.Unwinder
Another approach to thread stack spoofing.Dumpy
Reuse open handles to dynamically dump LSASS.RustChain
Hide memory artifacts using ROP and hardware breakpoints.Bin-Finder
Detect EDR's exceptions by inspecting processes' loaded modulesrust_tips_and_tricks
Rust For Windows CheatsheetCustomEntryPoint
Select any exported function in a dll as the new dll's entry point.Scripts
Repository for dirty scripts and PoCsFingeth
Python fingerprint authentication PoC using Ethereum's blockchain and smart contracts.Love Open Source and this site? Check out how you can help us