EvilBytecode / PPID-Spoofing
Parent Process ID Spoofing, coded in CGo.
☆21Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for PPID-Spoofing
- Unhook Ntdll.dll, Go & C++.☆14Updated 4 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆30Updated last year
- ☆37Updated 3 weeks ago
- A simple rpc2socks alternative in pure Go.☆24Updated 4 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆16Updated 3 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆22Updated 2 months ago
- Golang Implementation of Hell's gate☆15Updated last year
- A simple website to act as a store for havoc modules and extensions☆22Updated 6 months ago
- Just another Process Injection using Process Hollowing technique.☆16Updated last year
- DFSCoerce exe revisited version with custom authentication☆36Updated 10 months ago
- Proof of Concept Exploit for CVE-2024-9465☆25Updated last month
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆31Updated last year
- BOF for C2 framework☆40Updated last week
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- Extension functionality for the NightHawk operator client☆26Updated last year
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆15Updated 4 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 6 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆10Updated 4 months ago
- ☆25Updated last year
- ☆18Updated last month
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆31Updated 3 weeks ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆42Updated 3 months ago
- A pure C version of SymProcAddress☆23Updated 8 months ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆18Updated 9 months ago
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- All my POC related to malware development☆11Updated 6 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year