BlackHat-Ashura / Process_Ghosting
Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by a file. This is an evasion technique.
☆14Updated 9 months ago
Alternatives and similar repositories for Process_Ghosting:
Users that are interested in Process_Ghosting are comparing it to the libraries listed below
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- A pure C version of SymProcAddress☆25Updated 11 months ago
- API Hammering with C++20☆45Updated 2 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆41Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- ☆25Updated last week
- Just another Process Injection using Process Hollowing technique.☆16Updated last year
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆30Updated 8 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 7 months ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆15Updated 2 years ago
- miscellaneous codes☆35Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆70Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆14Updated last month
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆22Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆47Updated last year
- BOF for C2 framework☆39Updated 3 months ago
- Unhook Ntdll.dll, Go & C++.☆19Updated 7 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 9 months ago
- ☆23Updated 10 months ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 2 months ago
- ☆37Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago