0prrr / Malwear-Sweet
Malware?
☆69Updated 5 months ago
Alternatives and similar repositories for Malwear-Sweet:
Users that are interested in Malwear-Sweet are comparing it to the libraries listed below
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 8 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 7 months ago
- ☆61Updated 9 months ago
- ☆133Updated last year
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- ☆96Updated 2 months ago
- ☆125Updated 6 months ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆113Updated last year
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- shell code example☆33Updated last week
- ☆98Updated last year
- ☆119Updated last year
- Find DLLs with RWX section☆78Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆133Updated 2 years ago
- ☆85Updated 7 months ago
- Tool for playing with Windows Access Token manipulation.☆54Updated 2 years ago
- ☆112Updated 2 years ago
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆92Updated 11 months ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆128Updated 7 months ago
- stack spoofing☆80Updated 4 months ago
- A collection of position independent coding resources☆67Updated last month
- ☆52Updated 2 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆42Updated last year
- Do some DLL SideLoading magic☆79Updated last year