CyberSecurityUP / ProcessKiller-BYOVDLinks
BYOVD Technique Example using viragt64 driver
β48Updated last year
Alternatives and similar repositories for ProcessKiller-BYOVD
Users that are interested in ProcessKiller-BYOVD are comparing it to the libraries listed below
Sorting:
- Windows AppLocker Driver (appid.sys) LPEβ63Updated last year
- π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Pythonβ45Updated last year
- API Hammering with C++20β49Updated 3 years ago
- Reimplementation of the KExecDD DSE bypass technique.β53Updated 11 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.β73Updated last year
- a demo module for the kaine agent to execute and inject assembly modulesβ40Updated 11 months ago
- early cascade injection PoC based on Outflanks blog post, in rustβ60Updated 9 months ago
- A POC of a new βthreadlessβ process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and reβ¦β27Updated 2 years ago
- Template-based generation of shellcode loadersβ79Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.β64Updated 2 years ago
- Win32 keylogger that supports all (non-ime using) languages correctlyβ50Updated last year
- This program is used to perform reflective DLL Injection to a remote process specified by the user.β66Updated 2 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussioβ¦β79Updated 2 months ago
- Various methods of executing shellcodeβ71Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dllβ38Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.β35Updated 3 years ago
- XOR decrypting shellcode using the GPU with OpenCL.β114Updated 3 months ago
- Callstack spoofing using a VEH because VEH all the things.β23Updated 5 months ago
- Exploiting the KsecDD Windows driver through Server Silosβ73Updated 9 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loaderβ54Updated last year
- shell code exampleβ62Updated 3 months ago
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.β117Updated this week
- In-memory hiding techniqueβ57Updated 7 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.β69Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcodeβ48Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)β83Updated 2 years ago
- β88Updated last year
- Splitting and executing shellcode across multiple pagesβ101Updated 2 years ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.β96Updated 6 months ago
- Demoting PPL anti-malware services to less than a guest userβ64Updated 6 months ago