ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ's repositories
64KernelDriverCleaner
A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList however requires a PG Bypass on (Some) Machines > 22H2 Win10, Not Win 11
awesome-edr-bypass
Awesome EDR Bypass Resources For Ethical Hacking
bandicam-overlay-hook
Hijack Bandicam's in-game overlay for rendering onto the screen with DirectX11.
cetrainer-unpacker
A simple tool to unpack/decrypt Cheat Engine's trainers
Desire-Public
Fortnite External Leak Und lol
DojoLoader
Generic PE loader for fast prototyping evasion techniques
EDR-XDR-AV-Killer
Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver
FunctionInliner
An IDA plugin that eases reversing of binaries that have been code-size-optimized with function outlining
Game-Cheating-Tutorial
热门网络游戏辅助开发教程
h-ui
Just the panel for Hysteria2 / 仅仅是 Hysteria2 的面板
io-uring-ipc
Shared memory inter process comunication with io_uring
IOS-Il2CppDumper
Dump il2cpp data at runtime on iOS
Killer
Killer tool is designed to bypass AV/EDR security tools using various evasive techniques.
MapPasswordTool
TM2020 tool to remove password lock for editing from maps
memhv
Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities
MemoryGuard
Experiment with PAGE_GUARD protection to hide memory from other processes
plthook
Hook function calls by replacing PLT(Procedure Linkage Table) entries.
PortProxyGUI
A manager of netsh interface portproxy which is to evaluate TCP/IP port redirect on windows.
Practical-Cryptography-for-Developers-Book
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
PwnedBoot
Using Windows' own bootloader as a shim to bypass Secure Boot
RopView
A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.
solstice
PE loader for @carrot_c4k3's GameScript Xbox One exploit
Spreen_webshare
Now use any device with a web browser as a second screen for your laptop or PC. No cables. No internet. No software installation. Just Spreen, that's it.
Themida-3.x.x-CRC-Bypass
Just taking the proof of concept and making it a concept of proof. Implemented all pseudo- dependencies and missing includes
Voidgate
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encrypted assembly instructions, thus rendering memory scanners useless for that specific memory page.
windbgonuefi.netaot
这篇文章的目的是介绍一款实验性的Uefi项目基于.NET NativeAOT模式实现的运行在Windows Hyper-V虚拟机上的windbg调试引擎开发心得
ZeroHVCI
Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling without admin permissions or kernel drivers.