CarlosG13 / Process-Hypnosis-Debugger-assisted-control-flow-hijack
☆34Updated last year
Alternatives and similar repositories for Process-Hypnosis-Debugger-assisted-control-flow-hijack
Users that are interested in Process-Hypnosis-Debugger-assisted-control-flow-hijack are comparing it to the libraries listed below
Sorting:
- Next gen process injection technique☆53Updated 4 years ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 11 months ago
- a stage1 DLL loader with sleep obfuscation☆35Updated 2 years ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 10 months ago
- Malware?☆70Updated 7 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆46Updated 8 months ago
- Shellcode Loader Utilizing ETW Events☆63Updated 2 months ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated last month
- ☆30Updated 4 months ago
- Piece of code to detect and remove hooks in IAT☆63Updated 2 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆76Updated 2 weeks ago
- ☆42Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 9 months ago
- Red Team Operation's Defense Evasion Technique.☆52Updated 11 months ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆26Updated 10 months ago
- A pure C version of SymProcAddress☆27Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆100Updated last year
- Splitting and executing shellcode across multiple pages☆103Updated last year
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- Unhook Ntdll.dll, Go & C++.☆22Updated 3 weeks ago
- shell code example☆49Updated this week
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆62Updated last month
- stack spoofing☆84Updated 5 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆11Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- "Service-less" driver loading☆154Updated 5 months ago
- ☆54Updated 3 weeks ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago