EgeBalci / IAT_API
Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
☆68Updated last year
Related projects ⓘ
Alternatives and complementary repositories for IAT_API
- Assembly block for hooking windows API functions.☆81Updated 5 years ago
- Windows API Hashes used in the malwares☆40Updated 9 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆103Updated 3 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- ☆36Updated 2 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆103Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- ☆98Updated 2 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆97Updated last year
- APC DLL Injector with NtQueueApcThread and wake up thread support☆44Updated 7 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆69Updated 3 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 2 years ago
- Assembly API block that uses CRC32 for resolving Windows API function addresses☆17Updated last year
- ☆49Updated 4 years ago
- ☆37Updated 3 years ago
- Enabled / Disable LSA Protection via BYOVD☆62Updated 2 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆35Updated 3 years ago
- A simple COM server which provides a component to run shellcode☆132Updated 4 years ago
- Hijack Printconfig.dll to execute shellcode☆98Updated 3 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆39Updated 3 years ago
- ☆160Updated 2 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Updated 3 years ago
- C++ function that will automagically unhook a specified Windows API☆60Updated 4 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆92Updated 5 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆117Updated last year
- ☆58Updated 2 years ago
- Overwrite a process's recovery callback and execute with WER☆102Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆67Updated 2 years ago