0sha0 / SimpleByPassLinks
Simple Shellcode Loader Using 'Syscall' 'Detours' 'Simple hijacking Shellcode' 'Dynamic Function' to ByPass
☆18Updated last year
Alternatives and similar repositories for SimpleByPass
Users that are interested in SimpleByPass are comparing it to the libraries listed below
Sorting:
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆134Updated 2 years ago
- Detect BypassUAC using AMSI☆29Updated 11 months ago
- ☆21Updated 3 years ago
- Windows API Call Obfuscation☆112Updated 3 years ago
- ☆34Updated 2 years ago
- x86-x64 Packer with Portable Executable compatibility.☆100Updated last month
- shellcode-loaders and beacon-loaders☆72Updated 2 years ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆64Updated 3 years ago
- about how to make a anti-virus engine☆106Updated 8 months ago
- 针对windows rootkit的一些检测,分别从进程、端口、文件这三个方面进行检测。☆21Updated last year
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆80Updated 4 years ago
- shellcode生成框架☆89Updated last year
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 4 years ago
- Kill Protected Process Light Process (include av)☆58Updated 2 years ago
- Hide processes, files, services in Windows ring3☆32Updated last year
- A collection of cpuid instruction implementations for anti-vm purposes.☆10Updated 2 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆86Updated 3 years ago
- Enum and Remove Hook in Windows☆48Updated last month
- Change hash for a signed pe☆17Updated 2 years ago
- sc4cpp is a shellcode framework based on C++☆95Updated 4 years ago
- ☆20Updated 2 years ago
- bootkit驱动映射,三环进程注入加载指定模块☆14Updated last year
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆61Updated last week
- Call NtCreateUserProcess directly as normal.☆76Updated 3 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆77Updated last year
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆29Updated 4 years ago
- Convert PE files to a shellcode☆80Updated 5 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated 2 years ago
- Implementation of several code injection techniques.☆24Updated 3 years ago