0xsch1zo / NullGate
Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.
☆81Updated 2 weeks ago
Alternatives and similar repositories for NullGate:
Users that are interested in NullGate are comparing it to the libraries listed below
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- ☆125Updated 6 months ago
- A collection of position independent coding resources☆67Updated last month
- ☆150Updated 3 months ago
- A Mythic Agent written in PIC C.☆184Updated last month
- ForsHops☆63Updated this week
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 7 months ago
- ☆96Updated 2 months ago
- ☆110Updated 2 weeks ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆84Updated 11 months ago
- ☆104Updated last week
- ☆103Updated 4 months ago
- A Mythic agent for Windows written in C☆101Updated this week
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆117Updated last month
- ☆125Updated last month
- A BOF to enumerate system process, their protection levels, and more.☆116Updated 4 months ago
- ☆109Updated 4 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆72Updated last month
- Adversary Emulation Framework☆92Updated 8 months ago
- "Service-less" driver loading☆150Updated 4 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆184Updated 4 months ago
- ☆146Updated 7 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆172Updated last month
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆149Updated 2 weeks ago
- Stage 0☆154Updated 3 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- ☆103Updated 2 months ago
- Do some DLL SideLoading magic☆79Updated last year
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆127Updated 3 months ago