CarlosG13 / Process-Hypnosis-Debugger-assisted-control-flow-hijack
☆27Updated 10 months ago
Alternatives and similar repositories for Process-Hypnosis-Debugger-assisted-control-flow-hijack:
Users that are interested in Process-Hypnosis-Debugger-assisted-control-flow-hijack are comparing it to the libraries listed below
- A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls☆105Updated 4 months ago
- Next gen process injection technique☆44Updated 4 years ago
- Malware?☆69Updated 3 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆45Updated 4 months ago
- a stage1 DLL loader with sleep obfuscation☆34Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆95Updated last year
- ☆41Updated 2 years ago
- Piece of code to detect and remove hooks in IAT☆62Updated 2 years ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆41Updated 6 months ago
- ☆83Updated 5 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 5 months ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆24Updated 7 months ago
- A attempt at replicating BLACKLOTUS capabilities, whilst not acting as a direct mimic.☆87Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆71Updated 4 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆26Updated 5 months ago
- "Service-less" driver loading☆150Updated 2 months ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 2 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆13Updated 6 months ago
- A more reliable way of resolving syscall numbers in Windows☆50Updated 11 months ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆111Updated last year
- Red Team Operation's Defense Evasion Technique.☆52Updated 7 months ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆133Updated last year
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆22Updated 6 months ago
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆63Updated last week
- Finding Truth in the Shadows☆88Updated 2 years ago
- EvtPsst☆53Updated last year
- A kernel vulnerability used to achieve arbitrary read-write on Windows prior to July 2022☆104Updated 2 years ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆96Updated 10 months ago
- Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files☆61Updated last year