0xlane / ppspoofing
Rust编写的父进程PID欺骗技术测试工具
☆54Updated 2 years ago
Alternatives and similar repositories for ppspoofing
Users that are interested in ppspoofing are comparing it to the libraries listed below
Sorting:
- DLL 转发工具方法。☆52Updated last year
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆46Updated 3 years ago
- A SigFlip implement in golang☆46Updated 3 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆15Updated last year
- Hide Port In Windows☆38Updated 6 months ago
- 一款基于Http.sys的利用工具 ZhuriLab/Joker 备份☆23Updated 2 years ago
- HVNC based on RustDesk☆90Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆16Updated last year
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的 加载器☆56Updated last year
- RawCopy - Golang implementation☆23Updated 2 years ago
- works but not work, cao!☆24Updated 3 years ago
- A packer which adds encrypted shell to protect your PE file☆22Updated 6 months ago
- BOF内存运行exe☆27Updated last year
- ReturnGate, just like HellsGate.☆66Updated 2 years ago
- ProcessGhosting 技术的 rust 实现版本☆25Updated 6 months ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆61Updated 11 months ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆33Updated 3 years ago
- A BOF/COFF loader implemented in Go and CGO.☆22Updated last year
- 将PE文件进行AES加密,然后从远程拉取加载内存中实现免杀☆36Updated 2 years ago
- ReflectiveDLL学习代码☆33Updated 4 years ago
- improved shellcode template for b1tg/rust-windows-shellcode☆27Updated 4 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆60Updated 4 years ago
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- Golang implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆26Updated 3 years ago
- 不依赖驱动的跨平台抓包工具☆33Updated 2 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆69Updated 2 years ago
- Bringing Shikata ga nai to the front html☆20Updated 3 years ago
- unhook etw by golang☆10Updated 3 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Updated 2 years ago
- ☆20Updated last year