Skip to content
View GetRektBoy724's full-sized avatar
💀
goofy ahh
💀
goofy ahh
  • Indonesia

Block or report GetRektBoy724

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment

YARA 394 45 Updated Jan 11, 2025

nmi stackwalking + module verification

C 102 24 Updated Dec 28, 2023
C++ 18 1 Updated Jul 15, 2023

"Service-less" driver loading

C++ 148 21 Updated Nov 28, 2024

Research on obfuscated licensing APIs / CLIP service in the Windows kernel

C 103 6 Updated Aug 23, 2022

Reimplementation of Microsoft's Warbird obuscator

C++ 112 11 Updated Jun 24, 2024

An example of how to use Microsoft Windows Warbird technology

C 27 3 Updated Apr 23, 2023

Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR hooks in Windows.

C 233 32 Updated Jul 31, 2024

Obfusheader.h is a portable header file for C++14 compile-time obfuscation.

C++ 550 74 Updated Aug 19, 2024

C++17 PE manualmapper

C++ 305 75 Updated Oct 2, 2021

Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijack execution flow

C 203 33 Updated Oct 31, 2024

Windows kernel and user mode emulation.

Python 1,553 235 Updated Apr 12, 2024

Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.

C++ 568 73 Updated Dec 25, 2024

Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.

C++ 853 180 Updated Nov 21, 2019

Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard

C++ 244 29 Updated Aug 31, 2022

Hook NtDeviceIoControlFile with PatchGuard

C++ 103 50 Updated May 10, 2022

A x64 Windows Rootkit using SSDT or Hypervisor hook

C++ 524 111 Updated Jan 4, 2025

TOTALLY HARMLESS LIBERATION PROMPTS FOR GOOD LIL AI'S

4,490 583 Updated Jan 20, 2025

Using LNK files and user input simulation to start processes under explorer.exe

C 24 3 Updated Sep 21, 2024

Bypass LSA protection using the BYODLL technique

C 153 32 Updated Sep 21, 2024

A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.

C 1,561 196 Updated Nov 3, 2024

Translate virtual addresses to physical addresses from usermode.

C++ 34 7 Updated Jun 7, 2024

Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package. Windows ONLY.

Go 528 53 Updated Aug 24, 2024

SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the process of constructing and utilizing structures, assigning varia…

Python 128 13 Updated Nov 8, 2024

A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities

Python 646 84 Updated Oct 26, 2024

Compileable POC of namazso's x64 return address spoofer.

C++ 51 15 Updated Jun 10, 2020

Admin to Kernel code execution using the KSecDD driver

C 244 41 Updated Apr 19, 2024

HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate operating system tasks with ease.

C++ 361 64 Updated Jun 3, 2023

Simple x86-64 VT-x Hypervisor with EPT Hooking

C 865 149 Updated Apr 24, 2023
Next