BlackHat-Ashura / Process_Ghosting
Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by a file. This is an evasion technique.
☆14Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for Process_Ghosting
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆32Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- Small tool to play with IOCs caused by Imageload events☆38Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- A pure C version of SymProcAddress☆23Updated 8 months ago
- Section-based payload obfuscation technique for x64☆58Updated 3 months ago
- ☆58Updated 11 months ago
- stack spoofing☆57Updated last week
- ☆37Updated last month
- API Hammering with C++20☆34Updated 2 years ago
- EvtPsst☆54Updated last year
- miscellaneous codes☆35Updated last year
- ☆26Updated last month
- ☆34Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆51Updated last year
- Hooked create process injection for meterpreter☆23Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆42Updated 2 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆38Updated 11 months ago
- BOF for C2 framework☆40Updated 2 weeks ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆85Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆37Updated 6 months ago
- Bypassing Amsi using LdrLoadDll☆24Updated last month
- ☆22Updated 6 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆38Updated last year
- Extension functionality for the NightHawk operator client☆26Updated last year
- Just another Process Injection using Process Hollowing technique.☆16Updated last year