Stars
swzhouu / PE-Obfuscator
Forked from SaadAhla/PE-ObfuscatorPE obfuscator with Evasion in mind
swzhouu / winafl
Forked from googleprojectzero/winaflA fork of AFL for fuzzing Windows binaries
swzhouu / mimikatz
Forked from gentilkiwi/mimikatzA little tool to play with Windows security
swzhouu / SyscallTables
Forked from hfiref0x/SyscallTablesWindows NT x64 Syscall tables
Flipper Zero firmware source code
swzhouu / UACME
Forked from hfiref0x/UACMEDefeating Windows User Account Control
swzhouu / PetitPotam
Forked from topotam/PetitPotamPoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
.NET assembly loader with patchless AMSI and ETW bypass
swzhouu / donut
Forked from TheWover/donutGenerates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
swzhouu / Dirty-Vanity
Forked from deepinstinct/Dirty-VanityA POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass…
swzhouu / NtCall64
Forked from hfiref0x/NtCall64Windows NT x64 syscall fuzzer
swzhouu / birdnet-poc
Forked from inb1ts/birdnet-pocExperimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.