Skip to content
View leoloobeek's full-sized avatar

Block or report leoloobeek

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.

C# 115 9 Updated Feb 9, 2022
PowerShell 6 Updated Apr 20, 2024

It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)

Go 490 52 Updated Oct 12, 2022

Enumerate and disable common sources of telemetry used by AV/EDR.

C++ 778 127 Updated Mar 11, 2021

GIMPLE obfuscator for C, C++, Go, ... all supported GCC targets and front-ends that use GIMPLE.

C++ 392 34 Updated Jan 18, 2021

Adaptive DLL hijacking / dynamic export forwarding

C++ 732 124 Updated Jul 6, 2020

APC DLL Injector with NtQueueApcThread and wake up thread support

C++ 45 13 Updated Sep 21, 2017

Weaponizing Gigabyte driver for priv escalation and bypass PPL

C 68 32 Updated Jun 30, 2019

Visual Studio (C++) Solution Template for Payloads

C++ 18 11 Updated Oct 30, 2019

AV/EDR evasion via direct system calls.

Assembly 1,831 265 Updated Jan 1, 2023

Tools for discovery and abuse of COM hijacks

PowerShell 296 46 Updated Oct 15, 2019

Copy cat model for Proofpoint

Python 80 4 Updated Apr 30, 2020

Machine learning enabled dropper

Jupyter Notebook 26 10 Updated May 1, 2023

Dump ntds.dit really fast

Go 375 49 Updated Oct 1, 2021

This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemory.

C++ 581 145 Updated Mar 19, 2019

PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls

C 39 18 Updated Nov 20, 2015

Windows Task Scheduler Library for Go

Go 143 32 Updated Dec 22, 2024
Go 20 2 Updated Jan 25, 2019

XOR encryption implementations for several languages.

Visual Basic .NET 354 83 Updated Mar 7, 2023

The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification

PowerShell 375 77 Updated Jul 25, 2019

Vectored Exception Handling Hooking Class

C++ 146 38 Updated Jan 14, 2019

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

C++ 6,032 1,179 Updated Jan 12, 2025

How To Execute Shellcode via HTA

JavaScript 8 5 Updated Apr 19, 2017

Inject code into a legitimate process

C++ 143 54 Updated Dec 9, 2014

Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).

C++ 3,180 441 Updated Dec 14, 2024

Automated, Collection, and Enrichment Platform

PowerShell 323 63 Updated Nov 14, 2019

Embed and hide any file in an HTML file

HTML 481 118 Updated Sep 27, 2017

APT & CyberCriminal Campaign Collection

YARA 3,785 945 Updated Jul 25, 2024
C++ 801 208 Updated Dec 28, 2019
Next