Windows internals, malware analysis, reverse engineering, penetration testing
Pinned Loading
-
JITLoader
JITLoader PublicUsing the .NET JIT compiler's RWX memory to decrypt and execute shellcode without using APIs or syscalls.
C#
-
Powershell-Smuggler
Powershell-Smuggler PublicDecrypting a powershell script and executing it using scriptblock smuggling, bypassing AMSI and some telemetry.
PowerShell 1
-
Shellcode-Toolkit
Shellcode-Toolkit PublicA simple, easy to use toolkit for generating highly optimized shellcode and tiny executables using Windows GCC.
C
-
SuspendedSyscalls
SuspendedSyscalls PublicExtracting syscall numbers from a suspended process before it can be hooked or obfuscated by an EDR
C
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.