Skip to content
View swzhouu's full-sized avatar

Organizations

@Secure-D

Block or report swzhouu

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
12 stars written in C
Clear filter

PE obfuscator with Evasion in mind

C 1 Updated Apr 25, 2023

A fork of AFL for fuzzing Windows binaries

C 1 Updated Oct 28, 2023

A little tool to play with Windows security

C 1 Updated Jan 5, 2024

Windows NT x64 Syscall tables

C 1 Updated Dec 17, 2023

Flipper Zero firmware source code

C 1 Updated Dec 21, 2022

Defeating Windows User Account Control

C 1 Updated Apr 29, 2022

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

C 1 Updated Apr 11, 2023

.NET assembly loader with patchless AMSI and ETW bypass

C 1 Updated Apr 19, 2023

Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

C 1 Updated Nov 3, 2023

A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass…

C 1 Updated Dec 8, 2022

Windows NT x64 syscall fuzzer

C 1 Updated Aug 10, 2023

Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.

C 1 Updated Jul 9, 2023