Skip to content
View asdulp's full-sized avatar

Block or report asdulp

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
36 stars written in C
Clear filter

Embedded TCP/IP network stack with embedded web server, Websocket, and MQTT client

C 11,420 2,757 Updated Feb 19, 2025

C in four functions

C 10,016 1,441 Updated Dec 26, 2023

🔥 比libevent/libuv/asio更易用的网络库。A c/c++ network library for developing TCP/UDP/SSL/HTTP/WebSocket/MQTT client/server.

C 6,991 1,270 Updated Feb 7, 2025

《数据结构》-严蔚敏.吴伟民-教材源码与习题解析

C 3,660 991 Updated Jul 20, 2022

Dynamic Instrumentation Tool Platform

C 2,754 576 Updated Feb 24, 2025

The wolfSSL library is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. wolfSSL supports up to TLS 1.3 and DTLS 1.3!

C 2,417 846 Updated Feb 24, 2025

📘《TCP/IP网络编程》(韩-尹圣雨)学习笔记

C 2,327 401 Updated Sep 25, 2024

Hiding kernel-driver for x86/x64.

C 2,193 423 Updated Jan 29, 2025

🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc

C 1,873 498 Updated Jul 13, 2022

A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

C 1,289 248 Updated Nov 22, 2023

Zero-Day Code Injection and Persistence Technique

C 1,223 415 Updated Aug 24, 2022

A memory-based evasion technique which makes shellcode invisible from process start to end.

C 1,169 141 Updated Oct 16, 2023

Native API header files for the System Informer project.

C 1,114 178 Updated Feb 5, 2025

在Windows环境下的进程注入方法:远程线程注入、创建进程挂起注入、反射注入、APCInject、SetWindowHookEX注入

C 650 138 Updated Sep 22, 2018

My implementation of enSilo's Process Doppelganging (PE injection technique)

C 594 118 Updated Aug 30, 2022

A BOF that runs unmanaged PEs inline

C 574 69 Updated Oct 23, 2024

Performing Indirect Clean Syscalls

C 513 68 Updated Apr 19, 2023

Simulate the behavior of AV/EDR for malware development training.

C 460 37 Updated Feb 15, 2024

Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists

C 416 59 Updated Jun 1, 2023

Fast Conversion Windows Dynamic Link Library To ShellCode

C 391 134 Updated Mar 10, 2022

C++ self-Injecting dropper based on various EDR evasion techniques.

C 366 68 Updated Feb 11, 2024

Some ways to inject a DLL into a alive process

C 359 114 Updated Apr 26, 2018

Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs

C 292 39 Updated Sep 28, 2022

A BOF to automate common persistence tasks for red teamers

C 273 44 Updated Mar 7, 2023

PoC memory injection detection agent based on ETW, for offensive and defensive research purposes

C 264 42 Updated Apr 10, 2021

This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.

C 241 33 Updated Apr 29, 2023

RISC-V Virtual Machine

C 212 15 Updated Feb 20, 2025

A high-performance, high-stability, cross-platform HTTP client.

C 195 83 Updated Feb 6, 2023

A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (using pe2shc by @hasherezade). Payload encryption via System…

C 171 23 Updated Feb 10, 2023
Next