EvilBytecode / Detecting-Indirect-SyscallsLinks
Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.
☆50Updated 2 months ago
Alternatives and similar repositories for Detecting-Indirect-Syscalls
Users that are interested in Detecting-Indirect-Syscalls are comparing it to the libraries listed below
Sorting:
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- ☆108Updated last year
- .NET tool used to enrich RPC telemetry☆101Updated 7 months ago
- ☆59Updated last year
- ☆61Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- Find DLLs with RWX section☆80Updated 2 years ago
- ☆47Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated 2 years ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆139Updated last month
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Updated 2 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Sniffing files generator☆59Updated 10 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Updated 2 years ago
- ☆54Updated 7 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- EvtPsst☆55Updated 2 years ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 5 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆92Updated 4 months ago
- Things i do because i saw it on twitter on a weekend☆57Updated 5 months ago
- malleable profile generator GUI for Havoc☆56Updated 2 years ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆154Updated last month
- ☆83Updated last year
- A pure C version of SymProcAddress☆30Updated last year
- in-process powershell runner for BRC4☆48Updated 2 years ago