EvilBytecode / Ntdll-Unhook
Unhook Ntdll.dll, Go & C++.
☆21Updated 2 weeks ago
Alternatives and similar repositories for Ntdll-Unhook:
Users that are interested in Ntdll-Unhook are comparing it to the libraries listed below
- Section-based payload obfuscation technique for x64☆59Updated 9 months ago
- A pure C version of SymProcAddress☆27Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 7 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- ☆55Updated 6 months ago
- Shellcode Loader Utilizing ETW Events☆63Updated 2 months ago
- Proxy function calls through the thread pool with ease☆25Updated 2 months ago
- Rust template/library for implementing your own COFF loader☆50Updated 3 months ago
- ☆29Updated 4 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆47Updated 3 weeks ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆24Updated last month
- ☆48Updated last year
- ☆27Updated 3 months ago
- converts sRDI compatible dlls to shellcode☆29Updated 3 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- ☆36Updated 2 years ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆9Updated 2 weeks ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆18Updated 2 weeks ago
- BOF for C2 framework☆41Updated 6 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- ☆34Updated last month
- Rewrite to fit my needs☆27Updated 9 months ago
- NailaoLoader: Hiding Execution Flow via Patching☆20Updated 2 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆22Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆25Updated 6 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 8 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆26Updated 3 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year