CyberSecurityUP / SyscallHookDetector
☆17Updated 3 months ago
Alternatives and similar repositories for SyscallHookDetector:
Users that are interested in SyscallHookDetector are comparing it to the libraries listed below
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 6 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Golang Implementation of Hell's gate☆16Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆18Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆24Updated 8 months ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated 10 months ago
- The repository accompanying the Buer Emulation workshop☆23Updated 3 years ago
- ☆24Updated last week
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- Unix Process hollowing in rust☆20Updated last month
- Unhook Ntdll.dll, Go & C++.☆13Updated 6 months ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆13Updated 2 months ago
- Simple and sane cryptographic wrapper library.☆26Updated last year
- A work in progress BOF/COFF loader in Rust☆46Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 6 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 2 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- quASAR: ASAR manipulation made easy☆24Updated 2 years ago
- ☆35Updated 7 months ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- ☆27Updated last year
- ☆18Updated last week
- ☆23Updated 8 months ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 9 months ago