CyberSecurityUP / ProcessKiller-BYOVDLinks
BYOVD Technique Example using viragt64 driver
β66Updated last year
Alternatives and similar repositories for ProcessKiller-BYOVD
Users that are interested in ProcessKiller-BYOVD are comparing it to the libraries listed below
Sorting:
- Windows AppLocker Driver (appid.sys) LPEβ71Updated last year
- π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Pythonβ45Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.β126Updated last month
- a demo module for the kaine agent to execute and inject assembly modulesβ42Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.β66Updated 2 years ago
- Various methods of executing shellcodeβ73Updated 2 years ago
- API Hammering with C++20β49Updated 3 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loaderβ64Updated 2 years ago
- A POC of a new βthreadlessβ process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and reβ¦β32Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process holβ¦β70Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dllβ46Updated 2 years ago
- Splitting and executing shellcode across multiple pagesβ102Updated 2 years ago
- Template-based generation of shellcode loadersβ79Updated last year
- In-memory hiding techniqueβ63Updated last year
- This program is used to perform reflective DLL Injection to a remote process specified by the user.β65Updated 2 years ago
- Repository for the DEF CON 33 talk: Kill Chain Reloadedβ77Updated 5 months ago
- XOR decrypting shellcode using the GPU with OpenCL.β119Updated 7 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEHβ136Updated 4 months ago
- Reimplementation of the KExecDD DSE bypass technique.β57Updated last year
- β60Updated 2 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.β83Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)β83Updated 2 years ago
- Remap ntdll.dll using only NTAPI functions with a suspended processβ27Updated 9 months ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.β111Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.β69Updated 2 years ago
- β37Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.β36Updated 3 years ago
- A 64-bit, position-independent code reverse TCP shell for Windows β built in Rust.β84Updated 8 months ago
- early cascade injection PoC based on Outflanks blog post, in rustβ62Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.β72Updated last year