Pinned Repositories
APCLdr
Payload Loader With Evasion Features
AtomLdr
A DLL loader with advanced evasive features
AtomPePacker
A Highly capable Pe Packer
DeleteShadowCopies
Deleting Shadow Copies In Pure C++
EtwSessionHijacking
A Poc on blocking Procmon from monitoring network events
GP
using the gpu to hide your payload
HellShell
transform your payload into ipv4/ipv6/mac arrays
KnownDllUnhook
Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs
NoRunPI
Run Your Payload Without Running Your Payload
TerraLdr
A Payload Loader Designed With Advanced Evasion Features
NUL0x4C's Repositories
NUL0x4C/AtomPePacker
A Highly capable Pe Packer
NUL0x4C/AtomLdr
A DLL loader with advanced evasive features
NUL0x4C/TerraLdr
A Payload Loader Designed With Advanced Evasion Features
NUL0x4C/APCLdr
Payload Loader With Evasion Features
NUL0x4C/KnownDllUnhook
Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs
NUL0x4C/NoRunPI
Run Your Payload Without Running Your Payload
NUL0x4C/HellShell
transform your payload into ipv4/ipv6/mac arrays
NUL0x4C/DeleteShadowCopies
Deleting Shadow Copies In Pure C++
NUL0x4C/EtwSessionHijacking
A Poc on blocking Procmon from monitoring network events
NUL0x4C/Syscallslib
a library that automates some clean syscalls to make it easier to implement
NUL0x4C/FetchPayloadFromDummyFile
Construct the payload at runtime using an array of offsets
NUL0x4C/ManualRsrcDataFetching
Get your data from the resource section manually, with no need for windows apis
NUL0x4C/GP
using the gpu to hide your payload
NUL0x4C/T.D.P.
Using Thread Description To Hide Shellcodes
NUL0x4C/KctHijackLib
using the kct to run your shellcode the apt style
NUL0x4C/RecycleBinPersistence
using the Recycle Bin to insure persistence
NUL0x4C/PerunsFart
replace and unhook ntdll from a suspended process
NUL0x4C/AsmLogger
asm keylogger that handles special characters and writes to a file
NUL0x4C/ToasterLoader
just a stupid way to run a payload
NUL0x4C/EDRs
NUL0x4C/FOLIAGE
Public variation of FOLIAGE ( original developer )
NUL0x4C/process_doppelganging
My implementation of enSilo's Process Doppelganging (PE injection technique)
NUL0x4C/Ekko
Sleep Obfuscation
NUL0x4C/herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
NUL0x4C/NUL0x4C
NUL0x4C/openbsd
Source code pulled from OpenBSD for LibreSSL - this includes most of the library and supporting code. The place to contribute to this code is via the OpenBSD CVS tree. Please mail patches to tech@openbsd.org, instead of submitting pull requests, since this tree is often rebased.
NUL0x4C/process_ghosting
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
NUL0x4C/transacted_hollowing
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
NUL0x4C/KaynLdr
KaynLdr is a Reflective Loader written in C/ASM
NUL0x4C/VX-API
Collection of various malicious functionality to aid in malware development