0xDeku / NiceKatz
A nice process dumping tool
☆78Updated 2 years ago
Alternatives and similar repositories for NiceKatz:
Users that are interested in NiceKatz are comparing it to the libraries listed below
- I have documented all of the AMSI patches that I learned till now☆71Updated last year
- A basic C2 framework written in C☆59Updated 8 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆83Updated 2 years ago
- ☆112Updated 2 years ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- ☆47Updated 2 years ago
- TypeLib persistence technique☆108Updated 5 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆68Updated last year
- ☆154Updated 2 years ago
- Exploitation of echo_driver.sys☆169Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- ☆78Updated last year
- ☆121Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- ☆61Updated 9 months ago
- ☆119Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated last year
- A simple BOF that frees UDRLs☆117Updated 2 years ago
- ☆127Updated last year
- bring your own vulnerable driver☆92Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆100Updated last year
- Beacon Object File allowing creation of Beacons in different sessions.☆79Updated 2 years ago
- ☆36Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆80Updated 5 months ago
- Do some DLL SideLoading magic☆79Updated last year
- ☆62Updated 2 years ago
- ☆98Updated last year
- ☆53Updated 2 months ago
- Tool for playing with Windows Access Token manipulation.☆54Updated 2 years ago
- ☆125Updated last year