Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for c bypass
bypass
x
c
x
75 search results found
Bypass
⭐
1,437
Skip the HTML, Bypass takes markdown and renders it directly on Android and iOS.
Ktrw
⭐
577
An iOS kernel debugger based on a KTRR bypass for A11 iPhones; works with LLDB and IDA Pro.
Exploit_playground
⭐
571
Analysis of public exploits or my 1day exploits
Uac_bypass_in_the_wild
⭐
467
Windows 10 UAC bypass for all executable files which are autoelevate true .
Chw00t
⭐
361
chw00t - Unices chroot breaking tool
Termtunnel
⭐
344
Cross-platform terminal tunnel tool
Kasld
⭐
324
Kernel Address Space Layout Derandomization [ KASLD ] - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
Psychicpaper
⭐
315
iOS <13.5 sandbox escape/entitlement 0day
Xdl
⭐
311
🔥 xDL is an enhanced implementation of the Android DL series functions.
Vac Bypass
⭐
309
Valve Anti-Cheat bypass written in C.
Dpitunnel
⭐
294
DPITunnel is an android app made for censorship bypass
Hypervisor Injector
⭐
203
Easy To Use Hyper-Visor Injector for Easy Anti Cheat, Battleye | supports amd + intel | Undetected + Active updates
Silentbridge
⭐
191
Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Mysql Unsha1
⭐
174
Authenticate against a MySQL server without knowing the cleartext password
Sandbox
⭐
160
The sandbox libraries (libsandbox & pysandbox) are an open-source suite of software components for C/C++ and Python developers to create automated profiling tools and watchdog programs. The API's are designed for executing and instrumenting simple (single process) tasks, featuring policy-based behavioral auditing, resource quota, and statistics collecting.
Themidie
⭐
151
x64dbg plugin to bypass Themida 3.x Anti-Debugger / VM / Monitoring programs checks (x64)
Stfusip
⭐
129
System Integrity Protection (SIP) bypass for OSX 10.11.1 - 10.11.2 - 10.11.3
Cveac 2020
⭐
106
EasyAntiCheat Integrity check bypass by mimicking memory changes
Vac Bypass Loader
⭐
105
Loader for VAC Bypass written in C.
Ids_bypass
⭐
101
IDS Bypass tricks
Ayyxam
⭐
92
Bypass for The Digital Exam Monitor developed by the Danish Ministry of Education (Den Digitale Prøvevagt) and ExamCookie
Ieee1588 Ptp
⭐
90
An IEEE1588 Precision Time Protocol Implementation written in Python and C using a kernel bypass.
S8_2019_2215_poc
⭐
81
PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass
Ngx_log_if
⭐
78
conditional accesslog for nginx
Reflectiventdll
⭐
74
A Dropper POC focusing EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (using pe2shc by @hasherezade). Payload encryption via SystemFucntion033 NtApi and No new thread via Fiber
Payloadmask
⭐
69
Web Payload list editor to use techniques to try bypass web application firewall - version 0.2
Rtsectiontest
⭐
69
An Attempt to Bypass Memory Scanners By Misusing the ntdll.dll "RT" Section.
Firewalker
⭐
69
Onebyteldr
⭐
68
Bypass for CS:GO's LoadLibrary injection prevention mechanism, achieved by patching one byte of game memory.
Kaslr_tsx_bypass
⭐
63
Linux kASLR (Intel TSX/RTM) bypass static library
Hstshack
⭐
58
HSTS Hack for fast bypass http to https
Hsevd Stackoverflowx64
⭐
57
HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass
Firefox_tunnel
⭐
57
The way to use firefox to make a tunnel to remote communication, bypass any firewall
Sods
⭐
52
Socket over DNS tunnel
Proxydns
⭐
51
Tool written in C which bypasses DNS-based internet censorship even when port 53 is intercepted. No longer supported.
Exploit Remotedesktopserverdriver
⭐
49
exploit termdd.sys(support kb4499175)
Fatrat
⭐
43
PowerFull Administration Tool For Linux
Sppluaobjectuacbypass
⭐
42
Netcheck_bypass
⭐
42
Hsevd Arbitraryoverwritegdi
⭐
39
HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI
Winxp
⭐
37
Library for bypassing XPrivacy restrictions
Lkrg Bypass
⭐
35
LKRG bypass methods
Secist_applocker
⭐
33
Reflectiveelfloader
⭐
29
Code for diskless loading of ELF Shared Library using Reflective DLL Injection
Linux Anti Debugging
⭐
26
Kernel Codecave Poc
⭐
25
Proof of concept on how to bypass some limitations of a manual mapped driver
Lonelyalpc Bypassuac
⭐
25
Lonely x64 binary to Bypass Win10 UAC utilizing ALPC method with [command line]
Bypassav Dynimp
⭐
23
Bypass antivirus with dynamic import. Hide the api(s) used.
Danspecial
⭐
21
Weaponizing Gigabyte driver for priv escalation and bypass PPL
Dlfunc
⭐
20
Bypass dynamic linking function restriction on Android by forging caller address
Bypass Uac
⭐
19
Small utility written in c++ to bypass windows UAC prompt
Aslrekt
⭐
19
ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.
The Dpdk Common
⭐
18
A repository that includes common helper functions for writing applications in the DPDK. I will be using this for my future projects in the DPDK.
Hpm Plugins
⭐
17
Hercules Custom Plugins
Uac Tokenduplication
⭐
15
Emofishes
⭐
15
Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the ones setup for malware analysis).
Hsevd Stackcookiebypass
⭐
14
HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit
Dataprotector
⭐
13
A simple ransomware defender.It uses minifilter to filt "rewrite" and "delete" events in kernel.And it handles event in user mode.
Liboindirect
⭐
11
Bypass O_DIRECT open failures
Spectre Attack Example
⭐
10
2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) "幽灵" Spectre 漏洞利用例子
Demos
⭐
10
Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-class's.
Gpo Bypass
⭐
10
GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.
Jelbreaklib64e
⭐
8
jlebreakLib for arm64e devices
Bypass Core
⭐
7
Libflowbypass
⭐
7
Experimental XDP bypass stuff
Camio2
⭐
7
The Cambridge IO Library
Falco Bypasses
⭐
6
Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).
Study_protocol_analysis
⭐
6
Protocol analysis
F Stack
⭐
5
F-Stack is an open source high performance network framework based on DPDK.
Genslich
⭐
5
Fruitkit
⭐
5
Simple little rootkit made in C
Damn Vulnerable Tiny Web Server
⭐
5
Damn Vulnerable Tiny Web Server - A deliberately insecure webserver for learning purpose
Hacking For Kids
⭐
5
Project to teach kids hacking techniques to get them started early security, programming and technology in general.
42 Ftmacros
⭐
5
A simple norm compliant collection of recommended macros for 42, and some dark-side macros to use features the norm tries to prevent you from using. Please submit PRs of your favorite macros and norm bypasses (:
Bypass
⭐
5
ByPass project
Related Searches
C Kernel (12,842)
C Video Game (4,242)
C Driver (4,106)
Python C (4,069)
C Firmware (3,545)
C Arduino (3,118)
C Usb (2,589)
C Arm (2,566)
C Command Line (2,475)
C Algorithms (2,333)
1-75 of 75 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.