0prrr / Malwear-Sweet
Malware?
☆69Updated 4 months ago
Alternatives and similar repositories for Malwear-Sweet:
Users that are interested in Malwear-Sweet are comparing it to the libraries listed below
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 6 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆41Updated 7 months ago
- ☆94Updated last month
- ☆60Updated 8 months ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- BOF with Synthetic Stackframe☆108Updated 3 weeks ago
- ☆122Updated 5 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆93Updated 10 months ago
- Do some DLL SideLoading magic☆78Updated last year
- ☆84Updated 5 months ago
- Splitting and executing shellcode across multiple pages☆99Updated last year
- ☆134Updated last year
- ☆115Updated last year
- ☆120Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆133Updated 2 years ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆90Updated 11 months ago
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- Find DLLs with RWX section☆76Updated last year
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆125Updated 6 months ago
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆114Updated 2 years ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆58Updated last year
- ☆97Updated last year
- stack spoofing☆80Updated 3 months ago
- TypeLib persistence technique☆107Updated 3 months ago
- Threadless shellcode injection tool☆63Updated 6 months ago
- ☆112Updated 2 years ago