EvilBytecode / Nyx-Full-Dll-Unhook
(EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.
☆18Updated 7 months ago
Alternatives and similar repositories for Nyx-Full-Dll-Unhook:
Users that are interested in Nyx-Full-Dll-Unhook are comparing it to the libraries listed below
- Unhook Ntdll.dll, Go & C++.☆19Updated 8 months ago
- converts sRDI compatible dlls to shellcode☆21Updated last month
- Using LNK files and user input simulation to start processes under explorer.exe☆24Updated 5 months ago
- Windows C++ Implant for Exploration C2☆28Updated last month
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆19Updated 5 months ago
- A simple BOF (Beacon Object File) to search files in the system☆12Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆43Updated last year
- BypassCredGuard CS BOF☆31Updated last month
- ☆36Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆36Updated 6 months ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated 8 months ago
- Threadless injection via TLS callbacks☆16Updated 3 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆43Updated last year
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆43Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 5 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆34Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆47Updated last year
- ☆19Updated 2 weeks ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆17Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆62Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 9 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated 11 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆10Updated 7 months ago
- Threadless shellcode injection tool☆63Updated 7 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆46Updated 10 months ago
- ☆16Updated 7 months ago