EvilBytecode / NoMoreStealersLinks
NoMoreStealers is a Windows file system minifilter driver that protects sensitive user data from untrusted processes.
☆93Updated 2 months ago
Alternatives and similar repositories for NoMoreStealers
Users that are interested in NoMoreStealers are comparing it to the libraries listed below
Sorting:
- Comprehensive Windows Syscall Extraction & Analysis Framework☆161Updated 5 months ago
- .NET tool used to enrich RPC telemetry☆101Updated last week
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆180Updated 3 weeks ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆105Updated 5 months ago
- ☆108Updated last year
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆34Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 8 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆153Updated 6 months ago
- Enumerate active EDR's on the system☆150Updated 4 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆156Updated 2 months ago
- A collection of PoCs to do common things in unconventional ways☆122Updated 5 months ago
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆155Updated last week
- Utilizng an MCP Server to communicate with your C2☆86Updated 8 months ago
- Obex – Blocking unwanted DLLs in user mode☆280Updated 4 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- A 64 bit executable junk code engine for polymorphic malware.☆75Updated 7 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆81Updated 7 months ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆112Updated 3 months ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆119Updated last month
- Using Chromium-based browsers as a proxy for C2 traffic.☆140Updated 2 months ago
- Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.☆51Updated 3 months ago
- Commandline spoofing on Windows☆92Updated 2 months ago
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin☆121Updated last month
- "Service-less" driver loading☆177Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆129Updated last month
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆260Updated this week
- The code I write in my blog☆51Updated last week
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Updated 6 months ago
- Convert your shellcode into an ASCII string☆125Updated 7 months ago
- Execute shellcode via ASPNET compiler☆60Updated 4 months ago