- France
Pinned Loading
-
Shellcode-Ldr
Shellcode-Ldr PublicAdvanced shellcode loader with AES-256, EDR/AMSI/ETW bypass, indirect syscalls.
-
Usermode-Rootkit
Usermode-Rootkit PublicComplete Windows usermode rootkit with custom C2 server, dropper, and EDR bypass. Features: privilege escalation, process/file/registry hiding, keylogger, reverse shell. Evasion: indirect syscalls,…
-
-
Priv-Escalation-Exploit
Priv-Escalation-Exploit PublicPoC demonstrating a chained UAC bypass and token duplication to illustrate escalation from USER to NT AUTHORITY without inital Admin level.
-
IAT-Hooking
IAT-Hooking PublicSingle-header Windows library for function hooking by modifying the Import Address Table directly in memory. No external dependencies.
C++ 1
-
Malware-Evasion
Malware-Evasion PublicHow malware implements anti–reverse engineering techniques such as sandbox and VM evasion, anti-debugging, and memory integrity checks.
If the problem persists, check the GitHub status page or contact support.
