Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by a file. This is an evasion technique.
☆16May 6, 2024Updated last year
Alternatives and similar repositories for Process_Ghosting
Users that are interested in Process_Ghosting are comparing it to the libraries listed below
Sorting:
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51May 8, 2024Updated last year
- ☆10Jul 1, 2023Updated 2 years ago
- ☆25Apr 28, 2024Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆32Aug 23, 2023Updated 2 years ago
- ☆126Sep 1, 2024Updated last year
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12May 31, 2024Updated last year
- Cross-assemblers, cross-binutils and cross-compilers needed for rebuilding the UPX stubs☆17Jan 8, 2026Updated 2 months ago
- ☆20Nov 1, 2022Updated 3 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆15Apr 25, 2022Updated 3 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 8 months ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 2 weeks ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Feb 6, 2026Updated last month
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Jan 10, 2024Updated 2 years ago
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Umbrella will protect your shellcode from the rain.☆31Jun 4, 2025Updated 9 months ago
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆52Feb 25, 2026Updated last week
- ☆18Dec 23, 2024Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆169May 30, 2024Updated last year
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆443Jul 8, 2024Updated last year
- ☆27Mar 6, 2025Updated last year
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- ☆129Dec 4, 2023Updated 2 years ago
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.☆182Dec 23, 2025Updated 2 months ago