Kill Protected Process Light Process (include av)
☆58Sep 15, 2023Updated 2 years ago
Alternatives and similar repositories for KPPL
Users that are interested in KPPL are comparing it to the libraries listed below
Sorting:
- It stinks☆105Apr 22, 2022Updated 3 years ago
- Minimal PoC developed as discuss in https://captmeelo.com/redteam/maldev/2022/05/10/ntcreateuserprocess.html☆144May 10, 2022Updated 3 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Simple windows rpc server for research purposes only☆83May 29, 2022Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- BOF combination of KillDefender and Backstab☆167Mar 23, 2023Updated 2 years ago
- ☆81Feb 12, 2022Updated 4 years ago
- ☆14Sep 2, 2021Updated 4 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Sep 15, 2022Updated 3 years ago
- Call NtCreateUserProcess directly as normal.☆77May 17, 2022Updated 3 years ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆48Sep 27, 2021Updated 4 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆86Sep 15, 2022Updated 3 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆588Jan 24, 2023Updated 3 years ago
- LdrLoadDll Unhooking☆135Jan 16, 2022Updated 4 years ago
- ☆92Jun 29, 2021Updated 4 years ago
- ☆117Feb 11, 2022Updated 4 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- Inject unsigned DLL into Protected Process Light (PPL)☆40May 8, 2025Updated 9 months ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆195Jun 18, 2024Updated last year
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 2 years ago
- Mhy Exp (exploit signed driver)☆141May 17, 2022Updated 3 years ago
- 沙箱测试,测评国内常见沙箱的代码与结论☆107Jul 3, 2021Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆94Mar 8, 2023Updated 2 years ago
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆144Apr 21, 2022Updated 3 years ago
- ☆60Jun 26, 2022Updated 3 years ago
- ☆51Aug 28, 2021Updated 4 years ago
- A demo of the relevant blog post: https://www.arashparsa.com/hook-heaps-and-live-free/☆193Sep 9, 2021Updated 4 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆128Sep 9, 2022Updated 3 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- Misc TaskScheduler Plays☆238Sep 27, 2022Updated 3 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆102Jan 7, 2022Updated 4 years ago
- Security product hook detection☆326Mar 30, 2021Updated 4 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- 扫描以及恢复 r3hook 类☆10Aug 29, 2021Updated 4 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Jan 2, 2022Updated 4 years ago
- 过TP驱动☆28Feb 11, 2020Updated 6 years ago
- A PoC implementation for dynamically masking call stacks with timers.☆308Feb 13, 2023Updated 3 years ago