f11st's Projects
Alternative Shellcode Execution Via Callbacks
尝试恢复乱码
not a reverse-engineered version of the Cobalt Strike Beacon
Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications
Cheat Engine. A development environment focused on modding
Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege
A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.
新版MIUI应用商店安装管理净化
Elf binary infector written in Go.
大麦apk的反编译成品
DDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.
A work-in-progress deobfuscator for movfuscated binaries
A small and portable Windows C library for sandbox detection
An App Domain Manager Injection DLL PoC on steroids
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
Exploit tool implemented using ebpf.
EDRSandblast-GodFault
Developing a more covert Remote Access Trojan (RAT) tool by leveraging Electron's features for command injection and combining it with remote control methods.
elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative
热门网络游戏辅助开发教程
EDR绕过demo
Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2
HVNC for Cobalt Strike
Dynamically convert a native EXE to PIC shellcode by prepending a shellcode stub