Skip to content
View VirtualAlllocEx's full-sized avatar
🏠
Working from home
🏠
Working from home

Sponsoring

@BC-SECURITY

Highlights

  • Pro

Block or report VirtualAlllocEx

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. DEFCON-31-Syscalls-Workshop DEFCON-31-Syscalls-Workshop Public

    Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

    C 725 105

  2. Create-Thread-Shellcode-Fetcher Create-Thread-Shellcode-Fetcher Public

    This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (…

    C++ 257 51

  3. Payload-Download-Cradles Payload-Download-Cradles Public

    This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.

    PowerShell 255 55

  4. Direct-Syscalls-vs-Indirect-Syscalls Direct-Syscalls-vs-Indirect-Syscalls Public

    The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

    C 217 24

  5. Direct-Syscalls-A-journey-from-high-to-low Direct-Syscalls-A-journey-from-high-to-low Public

    Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).

    C 144 25

  6. HWBP-DEP-Bypass HWBP-DEP-Bypass Public

    Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulation on Windows x64. For security research and learning purpos…

    C 90 12