A custom implementation of GetModuleHandle, often used in malware to evade detection by bypassing standard API resolution methods
☆18Dec 31, 2024Updated last year
Alternatives and similar repositories for Custom-GetModuleHandle
Users that are interested in Custom-GetModuleHandle are comparing it to the libraries listed below
Sorting:
- ☆14Sep 18, 2024Updated last year
- A powerful PE file inspector for analyzing Portable Executable binaries, providing detailed insights into their structure, headers, and p…☆19Dec 30, 2024Updated last year
- This Malware is an application for MalwareEvasionTechniques repo .I used in it Registery staging in two modes R/W and I combined it with …☆16Sep 14, 2024Updated last year
- ☆15Sep 21, 2024Updated last year
- NTAPI Anti-Debugging Checker and Patcher is a Windows-based tool designed for research purposes, demonstrating how to detect and manipula…☆17Aug 25, 2024Updated last year
- Research in progress: A malware that abuses the GPU to accelerate the decryption process.☆21Feb 26, 2025Updated last year
- This is a malware that i used in it remote process injection technique, it scans for processes chooses the one you named and inject shell…☆18Sep 12, 2024Updated last year
- A repository showcasing payload execution control using mutexes, semaphores, and events in Windows, for educational purposes.☆17Dec 18, 2024Updated last year
- Function Stomping (MITRE ATT&CK ID: T1055.012) — Advanced injection technique overwriting legitimate functions with custom payloads to ev…☆18Dec 24, 2024Updated last year
- nexos source files made by @samdem-ai☆14Oct 7, 2024Updated last year
- A Windows string hashing toolkit for security research and malware analysis.Research implementation of malware-focused algorithms from V…☆15Dec 29, 2024Updated last year
- This is a repo that contains 2 techniques : Local mapping injection and Remote injection technique , MITRE ID T1055☆17Oct 12, 2024Updated last year
- This is a challenge made for NexTrace CTF, Malware Analysis case☆12Oct 21, 2024Updated last year
- A custom implementation of GetProcAddress, often used in malware to evade detection by bypassing standard API resolution methods☆18Dec 27, 2024Updated last year
- This is an application for both MalwareScanner and MalwareStaging☆17Sep 13, 2024Updated last year
- Research project showcasing various malware evasion techniques used to bypass AVs and EDRs, continuously updated with new methods.☆38Jan 8, 2025Updated last year
- Malware evasion technique by manipulating process command-line arguments to hide the actual executed payload, used to evade the manual de…☆16Dec 23, 2024Updated last year
- Implements dynamic Windows API resolution via hashing techniques to evade detection. Inspired by techniques mapped to MITRE ATT&CK T1055…☆18Jan 3, 2025Updated last year
- Native API injector☆27Aug 23, 2024Updated last year
- Code injection via Asynchronous Procedure Calls to bypass Windows defenses. Mapped to MITRE ATT&CK T1055.004.(Process Injection: Asynchro…☆33Oct 11, 2024Updated last year
- nexos source files made by @samdem-ai☆20Oct 7, 2024Updated last year
- Human Emotion Detection through various deep learning techniques , including using diverse model architectures, Transfer learning , Trans…☆12Dec 4, 2024Updated last year
- ☆17Oct 13, 2025Updated 4 months ago
- Assignments for the AI module (1CS). Covers logic, search algorithms , CSPs, expert systems, and more.☆14Nov 12, 2025Updated 3 months ago
- The front-end side of Uventlo Project☆16Apr 6, 2024Updated last year
- Config files for my GitHub profile.☆17Updated this week
- ☆13Aug 16, 2023Updated 2 years ago
- ☆26Jun 21, 2024Updated last year
- A Python script for checking emails and downloading attachments from specified senders using the imaplib and email libraries.☆22Apr 13, 2023Updated 2 years ago
- client side code for nexus security club website☆24Feb 18, 2024Updated 2 years ago
- A powerful chatbot assistant leveraging Retrieval-Augmented Generation (RAG) to answer questions from multiple PDF documents. RAGbot gene…☆16Dec 11, 2024Updated last year
- This repository Contain my own solutions for SparkCTF challenges☆11Apr 8, 2024Updated last year
- ☆15Mar 27, 2024Updated last year
- ☆15Mar 25, 2024Updated last year
- Java™17 SE Quick Tutorial Made by Me☆10Sep 23, 2022Updated 3 years ago
- ☆17Jan 20, 2024Updated 2 years ago
- ☆19Updated this week
- ☆17Feb 13, 2024Updated 2 years ago
- Advanced Penetration Testing Framework | Powered by Bash☆31Oct 31, 2024Updated last year