0xPrimo / Ntdll-Unhooking
Ntdll Unhooking
☆12Updated 2 weeks ago
Alternatives and similar repositories for Ntdll-Unhooking:
Users that are interested in Ntdll-Unhooking are comparing it to the libraries listed below
- ☆27Updated 3 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆18Updated 2 weeks ago
- Less sugar (entropy) for your binaries☆21Updated last month
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆48Updated last year
- Proxy function calls through the thread pool with ease☆25Updated 2 months ago
- Execute dotnet app from unmanaged process☆74Updated 4 months ago
- NailaoLoader: Hiding Execution Flow via Patching☆20Updated 2 months ago
- Beacon Debugger☆40Updated 6 months ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆16Updated 2 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆21Updated last year
- ☆30Updated last month
- Unhook Ntdll.dll, Go & C++.☆22Updated 2 weeks ago
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆47Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated last year
- ☆38Updated 2 months ago
- Beacon Object File (BOF) Template☆50Updated 5 months ago
- Load and execute a common object file format (COFF) in the current process☆28Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆18Updated 2 years ago
- A VSCode plugin to assist with BOF development.☆36Updated 8 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆11Updated 2 weeks ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated 2 weeks ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆22Updated last year
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆9Updated 2 weeks ago
- Using LNK files and user input simulation to start processes under explorer.exe☆25Updated 7 months ago
- x64 version☆34Updated 3 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated 10 months ago
- Sliver agent rewritten in C++☆44Updated 8 months ago