Lists (2)
Sort Name ascending (A-Z)
- All languages
- ABAP
- AMPL
- ActionScript
- Ada
- Adblock Filter List
- Assembly
- Astro
- AutoHotkey
- AutoIt
- Batchfile
- Bicep
- Bikeshed
- Blade
- C
- C#
- C++
- CLIPS
- CMake
- COBOL
- CSS
- Clojure
- CodeQL
- Common Lisp
- Coq
- Crystal
- Cuda
- D
- Dart
- Dockerfile
- EJS
- Elixir
- Emacs Lisp
- Erlang
- F#
- F*
- Fluent
- GDScript
- GLSL
- Gnuplot
- Go
- Groovy
- HCL
- HTML
- Haskell
- Imba
- Inno Setup
- JSON
- Jai
- Janet
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Just
- Kotlin
- LLVM
- Lean
- Less
- Liquid
- Lua
- MATLAB
- MDX
- MLIR
- MQL5
- Makefile
- Markdown
- Move
- Nix
- Nunjucks
- OCaml
- Objective-C
- Odin
- PHP
- PLpgSQL
- Pascal
- Perl
- PostScript
- PowerShell
- Processing
- Pug
- Python
- QML
- R
- Ren'Py
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- SVG
- Scala
- Scheme
- ShaderLab
- Shell
- Smali
- Smarty
- Solidity
- Svelte
- Swift
- SystemVerilog
- TSQL
- Tcl
- TeX
- TypeScript
- VBA
- VBScript
- VHDL
- Vala
- Verilog
- Vim Script
- Vim Snippet
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- Xmake
- YARA
- Zig
- mcfunction
- reStructuredText
Starred repositories
A simple PoC demonstrating the vulnerability in the ThrottleStop.sys driver, showcasing arbitrary physical memory read and write capabilities, as well as virtual-to-physical address translation usi…
AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)
Improved version of EKKO by @5pider that Encrypts only Image Sections
Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote memory scanners
Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules
Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table
This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp, socket)
Shellcode Loader with Indirect Dynamic syscall Implementation , shellcode in MAC format, API resolving from PEB, Syscall calll and syscall instruction address resolving at run time
A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.ex…
Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap
Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume threads
Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime
Github as C2 Demonstration , free API = free C2 Infrastructure
different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)
Patching AmsiOpenSession by forcing an error branching
Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell process is created, the implant will be executed too.
Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, and reverting back memory protections and original memory state
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
Documents Exfiltration project for fun and educational purposes
Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess.
parcadei / opencode
Forked from anomalyco/opencodeThe open source coding agent.
95% token savings. 155x faster queries. 16 languages. LLMs can't read your entire codebase. TLDR extracts structure, traces dependencies, and gives them exactly what they need.