A Practical example of ELAM (Early Launch Anti-Malware)
☆36Nov 12, 2021Updated 4 years ago
Alternatives and similar repositories for elam
Users that are interested in elam are comparing it to the libraries listed below
Sorting:
- ☆23May 28, 2021Updated 4 years ago
- Click Once + App Domain☆64Feb 23, 2026Updated last week
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆169May 17, 2023Updated 2 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- C Header Only Library for Virii☆11Nov 17, 2020Updated 5 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- silence file system monitoring components by hooking their minifilters☆60Jan 31, 2024Updated 2 years ago
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Jun 17, 2020Updated 5 years ago
- Run Processes as PPL with ELAM☆177Mar 17, 2022Updated 3 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Nov 17, 2019Updated 6 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- ☆17May 7, 2025Updated 9 months ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆133May 17, 2023Updated 2 years ago
- ☆84Aug 26, 2024Updated last year
- Protect a process from code injection, termination and hooking☆48Jul 16, 2021Updated 4 years ago
- PoC capable of detecting manual syscalls from usermode.☆206Nov 13, 2025Updated 3 months ago
- Six cases demonstrating methods of optimizing GetProcAddress☆18Jan 3, 2022Updated 4 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- ☆22Jul 10, 2020Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- It stinks☆105Apr 22, 2022Updated 3 years ago
- ☆59Jun 8, 2022Updated 3 years ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆64Jan 19, 2026Updated last month
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Sep 26, 2019Updated 6 years ago
- Get your data from the resource section manually, with no need for windows apis☆67Oct 22, 2024Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆43Apr 27, 2023Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- Threadless Process Injection through entry point hijacking☆350Sep 10, 2024Updated last year
- Advanced driver monitoring utility.☆219Jul 13, 2022Updated 3 years ago
- A bunch of scripts and code i wrote.☆149Nov 7, 2024Updated last year
- ☆119Jan 30, 2024Updated 2 years ago
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- ☆24Feb 1, 2025Updated last year
- Bypassing kernel patch protection runtime☆22Feb 19, 2023Updated 3 years ago