AbdouRoumi / ProcessHacker-Argument-Spoofer
Malware evasion technique by manipulating process command-line arguments to hide the actual executed payload, used to evade the manual detection of ProcessHacker and ProcessExplorer. MITRE ATT&CK ID: T1036.005 (Masquerading: Match Legitimate Name or Location).
☆14Updated 3 months ago
Alternatives and similar repositories for ProcessHacker-Argument-Spoofer:
Users that are interested in ProcessHacker-Argument-Spoofer are comparing it to the libraries listed below
- A custom implementation of GetProcAddress, often used in malware to evade detection by bypassing standard API resolution methods☆14Updated 3 months ago
- ☆13Updated 6 months ago
- ☆14Updated 6 months ago
- This Malware is an application for MalwareEvasionTechniques repo .I used in it Registery staging in two modes R/W and I combined it with …☆14Updated 6 months ago
- This is an application for both MalwareScanner and MalwareStaging☆15Updated 6 months ago
- A Windows string hashing toolkit for security research and malware analysis.Research implementation of malware-focused algorithms from V…☆14Updated 3 months ago
- A custom implementation of GetModuleHandle, often used in malware to evade detection by bypassing standard API resolution methods☆16Updated 3 months ago
- Implements dynamic Windows API resolution via hashing techniques to evade detection. Inspired by techniques mapped to MITRE ATT&CK T1055…☆15Updated 3 months ago
- This is a malware that i used in it remote process injection technique, it scans for processes chooses the one you named and inject shell…☆17Updated 6 months ago
- Research in progress: A malware that abuses the GPU to accelerate the decryption process.☆20Updated last month
- This is a repo that contains 2 techniques : Local mapping injection and Remote injection technique , MITRE ID T1055☆15Updated 5 months ago
- Function Stomping (MITRE ATT&CK ID: T1055.012) — Advanced injection technique overwriting legitimate functions with custom payloads to ev…☆16Updated 3 months ago
- A repository showcasing payload execution control using mutexes, semaphores, and events in Windows, for educational purposes.☆15Updated 3 months ago
- A powerful PE file inspector for analyzing Portable Executable binaries, providing detailed insights into their structure, headers, and p…☆18Updated 3 months ago
- Code injection via Asynchronous Procedure Calls to bypass Windows defenses. Mapped to MITRE ATT&CK T1055.004.(Process Injection: Asynchro…☆21Updated 5 months ago
- NTAPI Anti-Debugging Checker and Patcher is a Windows-based tool designed for research purposes, demonstrating how to detect and manipula…☆16Updated 7 months ago
- Native API injector☆25Updated 7 months ago
- Research project showcasing various malware evasion techniques used to bypass AVs and EDRs, continuously updated with new methods.☆24Updated 2 months ago
- nexos source files made by @samdem-ai☆12Updated 5 months ago
- A ML Model That Predict The Percentage of Winning for Each Blue And Red Team in League of Legends☆30Updated 9 months ago
- NetWise is a bandwidth management and optimization system developed for the DevFest Algiers Hackathon.☆12Updated 5 months ago
- nexos source files made by @samdem-ai☆20Updated 5 months ago
- Portfolio inspired from nest js official website using React and Material UI☆13Updated 3 months ago
- ☆26Updated 9 months ago
- sharing some writeups for ctf challs :)☆11Updated last year
- client side code for nexus security club website☆24Updated last year
- ☆10Updated 2 years ago
- a nice designed social media app linked with firebase.☆10Updated last year
- A powerful chatbot assistant leveraging Retrieval-Augmented Generation (RAG) to answer questions from multiple PDF documents. RAGbot gene…☆14Updated 3 months ago
- A Python script for checking emails and downloading attachments from specified senders using the imaplib and email libraries.☆21Updated last year