0xsch1zo / NullGate
Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.
☆92Updated this week
Alternatives and similar repositories for NullGate:
Users that are interested in NullGate are comparing it to the libraries listed below
- ☆154Updated 4 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- A Mythic Agent written in PIC C.☆186Updated 2 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Stage 0☆155Updated 4 months ago
- "Service-less" driver loading☆152Updated 4 months ago
- ☆104Updated 5 months ago
- A collection of position independent coding resources☆68Updated 2 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆76Updated last month
- ☆127Updated 7 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 3 weeks ago
- ☆152Updated 8 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆173Updated 2 months ago
- A Mythic agent for Windows written in C☆117Updated this week
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆186Updated 4 months ago
- Sleep obfuscation☆215Updated 4 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆136Updated 3 weeks ago
- ForsHops☆98Updated 3 weeks ago
- Find DLLs with RWX section☆79Updated last year
- ☆110Updated 4 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- ☆105Updated last month
- ☆140Updated 5 months ago
- Bypass LSA protection using the BYODLL technique☆157Updated 6 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆120Updated 6 months ago
- ☆128Updated 2 months ago
- ☆114Updated last month
- ☆61Updated 10 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆139Updated 2 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆90Updated 10 months ago