8000 ProcessusT (Processus) / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View ProcessusT's full-sized avatar

Highlights

  • Pro

Block or report ProcessusT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

POC CVE-2025-26318

Python 4 Updated Feb 28, 2025

Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework

C 377 44 Updated Jul 30, 2024

Implementing the ghostly hollowing PE injection technique using tampered syscalls.

C 151 27 Updated Mar 9, 2025

Generate FUD backdoors

C 248 52 Updated Mar 17, 2023

Simulate the behavior of AV/EDR for malware development training.

C 524 46 Updated Feb 15, 2024

A simple backdoor using Public API

Python 4 Updated May 5, 2025

The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

C 190 24 Updated Jan 20, 2024

Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments

PowerShell 418 60 Updated Mar 18, 2025

Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.

C++ 806 130 Updated Jul 2, 2024

Enumerating and removing kernel callbacks using signed vulnerable drivers

C++ 561 108 Updated Jan 24, 2023
0