0xcf80 / ShellCodeLoader_Indirect_SyscallsLinks
Shellcode Loader using indirect syscalls
☆16Updated 2 years ago
Alternatives and similar repositories for ShellCodeLoader_Indirect_Syscalls
Users that are interested in ShellCodeLoader_Indirect_Syscalls are comparing it to the libraries listed below
Sorting:
- ☆37Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 9 months ago
- ☆50Updated 6 months ago
- ☆33Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- ☆100Updated 2 years ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆85Updated 9 months ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 8 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Updated 7 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆84Updated last year
- I have documented all of the AMSI patches that I learned till now☆75Updated 3 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Updated 7 months ago
- Sleep Obfuscation☆45Updated 3 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Updated 2 years ago
- ☆75Updated 2 years ago
- Beacon Debugger☆55Updated last year
- Select any exported function in a dll as the new dll's entry point.☆82Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Updated last year
- Template-based generation of shellcode loaders☆80Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Updated 2 years ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆64Updated 2 weeks ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 6 months ago
- ☆43Updated 3 years ago