Stars
Embedded TCP/IP network stack with embedded web server, Websocket, and MQTT client
🔥 比libevent/libuv/asio更易用的网络库。A c/c++ network library for developing TCP/UDP/SSL/HTTP/WebSocket/MQTT client/server.
The wolfSSL library is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. wolfSSL supports up to TLS 1.3 and DTLS 1.3!
🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
Zero-Day Code Injection and Persistence Technique
A memory-based evasion technique which makes shellcode invisible from process start to end.
Native API header files for the System Informer project.
在Windows环境下的进程注入方法:远程线程注入、创建进程挂起注入、反射注入、APCInject、SetWindowHookEX注入
My implementation of enSilo's Process Doppelganging (PE injection technique)
Simulate the behavior of AV/EDR for malware development training.
Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists
Fast Conversion Windows Dynamic Link Library To ShellCode
C++ self-Injecting dropper based on various EDR evasion techniques.
Some ways to inject a DLL into a alive process
Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs
A BOF to automate common persistence tasks for red teamers
PoC memory injection detection agent based on ETW, for offensive and defensive research purposes
This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.
A high-performance, high-stability, cross-platform HTTP client.
A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (using pe2shc by @hasherezade). Payload encryption via System…