BlackHat-Ashura / Process_GhostingLinks
Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by a file. This is an evasion technique.
☆14Updated last year
Alternatives and similar repositories for Process_Ghosting
Users that are interested in Process_Ghosting are comparing it to the libraries listed below
Sorting:
- API Hammering with C++20☆46Updated 2 years ago
- A pure C version of SymProcAddress☆27Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- ☆34Updated 2 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 11 months ago
- string/file/shellcode encryptor using AES/XOR☆11Updated last year
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated 3 months ago
- BOF for C2 framework☆41Updated 7 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆19Updated last year
- ☆26Updated 4 months ago
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- ☆18Updated 3 weeks ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated last year
- ☆23Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆54Updated 2 years ago
- idk man this was the default github name☆35Updated 2 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆25Updated 2 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- A python polymorphic engine for C programs☆12Updated last year
- EvtPsst☆55Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 4 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated last year
- miscellaneous codes☆35Updated last year
- in-process powershell runner for BRC4☆45Updated last year
- ☆21Updated last year
- Section-based payload obfuscation technique for x64☆60Updated 10 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year