Faran-17 / Hellshazzard
Indirect Syscall implementation to bypass userland NTAPIs hooking.
☆54Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for Hellshazzard
- Section-based payload obfuscation technique for x64☆58Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆58Updated 5 months ago
- TypeLib persistence technique☆73Updated 3 weeks ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated 8 months ago
- ☆59Updated 5 months ago
- ☆88Updated 2 months ago
- ☆108Updated last year
- stack spoofing☆50Updated this week
- .NET assembly loader with patchless AMSI and ETW bypass in Rust☆29Updated last month
- Classic Process Injection with Memory Evasion Techniques implemantation☆63Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆19Updated 2 weeks ago
- ☆118Updated last year
- ☆96Updated last year
- ☆117Updated 2 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆57Updated 8 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 6 months ago
- Threadless shellcode injection tool☆60Updated 3 months ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆118Updated 3 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆73Updated last month
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆38Updated 4 months ago
- ☆81Updated 3 months ago
- ☆58Updated 11 months ago
- Malware?☆70Updated last month
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆78Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆113Updated last year
- A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls☆103Updated 2 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆37Updated 10 months ago