AzAgarampur / byeintegrity9-uac
☆36Updated 2 years ago
Alternatives and similar repositories for byeintegrity9-uac:
Users that are interested in byeintegrity9-uac are comparing it to the libraries listed below
- ☆46Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆62Updated last year
- ☆36Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆99Updated last year
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆45Updated 11 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- I have documented all of the AMSI patches that I learned till now☆71Updated last year
- stack spoofing☆79Updated 2 months ago
- ☆97Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- Sleep Obfuscation☆43Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated 10 months ago
- Halos Gate-based NTAPI Unhooker☆50Updated 2 years ago
- Execute dotnet app from unmanaged process☆69Updated last month
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆39Updated last year
- Get your data from the resource section manually, with no need for windows apis☆57Updated 3 months ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆81Updated last year
- ☆74Updated last year
- ☆112Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆68Updated last year
- ☆48Updated 3 weeks ago
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆65Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆41Updated last year
- bring your own vulnerable driver☆89Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆66Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆49Updated 3 months ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆81Updated last year
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆50Updated 2 years ago