
Malware
remote process injections using pool party techniques
A lightweight, self-contained, RESTful, searchable, multi-format NoSQL document store.
An embeddable implementation of the Ngaro Virtual Machine for Go programs
PowerShell Constrained Language Mode Bypass
PoC Implementation of a fully dynamic call stack spoofer
Collection of various malicious functionality to aid in malware development
Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.
Mythic C2 agent targeting Linux and Windows hosts written in Rust
Tool to bypass LSA Protection (aka Protected Process Light)
Proof-of-concept modular implant platform leveraging v8
Rapidly initialize Windows Sanbox for malware analysis and reverse engineering
A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and reflection techniques for code injection. This PoC showcases…
A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.
Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities