0sha0 / SimpleByPassLinks
Simple Shellcode Loader Using 'Syscall' 'Detours' 'Simple hijacking Shellcode' 'Dynamic Function' to ByPass
☆17Updated last year
Alternatives and similar repositories for SimpleByPass
Users that are interested in SimpleByPass are comparing it to the libraries listed below
Sorting:
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆129Updated 2 years ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆61Updated 2 years ago
- about how to make a anti-virus engine☆91Updated 5 months ago
- Detect BypassUAC using AMSI☆26Updated 8 months ago
- ☆33Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆74Updated 4 years ago
- Windows API Call Obfuscation☆108Updated 2 years ago
- Hide processes, files, services in Windows ring3☆30Updated last year
- X86 Packer with Portable Executable compatibility.☆61Updated 2 months ago
- ☆20Updated 3 years ago
- Change hash for a signed pe☆16Updated 2 years ago
- Kill Protected Process Light Process (include av)☆58Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- shellcode-loaders and beacon-loaders☆70Updated 2 years ago
- PoC for thread pool based process injection in Windows.☆117Updated 7 months ago
- Load static-compiled PE from remote server.☆67Updated 3 years ago
- sc4cpp is a shellcode framework based on C++☆93Updated 4 years ago
- Simulate per-process disconnection in red team environments☆111Updated 5 months ago
- An implementation of an indirect system call☆131Updated 2 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated 2 years ago
- shellcode生成框架☆87Updated last year
- 针对windows rootkit的一些检测,分别从进程、端口、文件这三个方面进行检测。☆20Updated 9 months ago
- ☆20Updated 2 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆27Updated 4 years ago
- Windows PE Signature Thief in C++☆51Updated 5 years ago
- User Mode Windows Rootkit☆68Updated last year
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 3 years ago
- ☆26Updated last year
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆162Updated 2 years ago