AlSch092 / HideStaticReferences
Research into removing strings & API call references at compile-time (Anti-Analysis)
☆24Updated 7 months ago
Alternatives and similar repositories for HideStaticReferences:
Users that are interested in HideStaticReferences are comparing it to the libraries listed below
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆29Updated 7 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆45Updated 4 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆41Updated last year
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 5 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- In-memory hiding technique☆45Updated 3 weeks ago
- API Hammering with C++20☆44Updated 2 years ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆43Updated 11 months ago
- stack spoofing☆77Updated 2 months ago
- ☆27Updated 6 months ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated 8 months ago
- ☆36Updated last year
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆64Updated last year
- Hooked create process injection for meterpreter☆23Updated 3 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆38Updated last year
- Threadless injection via TLS callbacks☆16Updated 2 months ago
- Next gen process injection technique☆44Updated 4 years ago
- ☆36Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆25Updated last year
- ☆83Updated 5 months ago
- Piece of code to detect and remove hooks in IAT☆62Updated 2 years ago
- Section-based payload obfuscation technique for x64☆59Updated 5 months ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆81Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆42Updated 10 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆21Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆38Updated 2 months ago
- Sleep Obfuscation☆43Updated 2 years ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆22Updated 6 months ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆42Updated last year