EvilBytecode / SsnRetrievalLinks
Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name, SSN, and address.
☆12Updated 2 months ago
Alternatives and similar repositories for SsnRetrieval
Users that are interested in SsnRetrieval are comparing it to the libraries listed below
Sorting:
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆22Updated 2 months ago
- GetSyscallStubCGo.☆10Updated 2 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Parent Process ID Spoofing, coded in CGo.☆22Updated 2 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆10Updated 2 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆20Updated 2 months ago
- ☆31Updated 3 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 2 months ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Updated 2 months ago
- A C# implementation that disables Windows Firewall bypassing UAC☆15Updated 8 months ago
- Near compile-time string obfuscation for Golang☆13Updated last year
- ☆40Updated 4 months ago
- Performs a global AMSI bypass by patching amsi.dll in memory.☆12Updated last month
- a demo module for the kaine agent to execute and inject assembly modules☆39Updated 10 months ago
- Misery Loader to bypass modern EDR solutions☆11Updated 6 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆10Updated 2 months ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆21Updated 3 months ago
- An example of Windows self-replicating malware.☆11Updated 2 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆16Updated 4 months ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching☆11Updated 2 years ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆24Updated 10 months ago
- Ntdll Unhooking☆13Updated 2 months ago
- Golang Implementation of Hell's gate☆17Updated 2 years ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆49Updated 5 months ago
- run process as PPL Antimalware☆10Updated last year
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated last year
- ☆27Updated 5 months ago
- ☆25Updated 8 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 2 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆31Updated 11 months ago