Block or Report
Block or report Hello-xBugs
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLists (1)
Sort Name ascending (A-Z)
Stars
Language
Sort by: Recently starred
Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver
一款后渗透免杀工具,助力每一位像我这样的脚本小子快速实现免杀,支持bypass AV/EDR 360 火绒 Windows Defender Shellcode Loader
Construct a payload at runtime using an array of offsets
Web Fuzzing Box - Web 模糊测试字典与一些Payloads
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…
A codebase aimed to make interaction with Windows and native execution easier
🔥🔥🔥 Laravel Ecommerce Laravel Shop BeikeShop商城 多语言商城 多货币商城 100%全开源 ChatGPT OpenAI B2C商城系统 H5商城 PHP商城系统 商城源码 PC商城 跨境电商系统 跨境商城系统 电商商城系统 Laravel 10 框架开发系统,支持插件市场。 Event 机制实现Hook功能,自定义可视化装修。BeikeShop一款…
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
TikTok 主页/合辑/视频/图集/原声;抖音主页/视频/图集/收藏/直播/原声/合集/评论/账号/搜索/热榜数据采集工具
🌐 The Web OS! Free, Open-Source, and Self-Hostable.
PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC
A small PoC demonstrating TLS interception on both HTTP1 and HTTP2
Log data to/from SSL_write/SSL_read to disk using LD_PRELOAD hooks
A POC to disable TamperProtection and other Defender / MDE components
SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection support.
Unofficial open source mtproto server written in golang with compatible telegram client.
smbclient-ng, a fast and user friendly way to interact with SMB shares.
A slightly more fun way to disable windows defender + firewall. (through the WSC api)
Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()