Faran-17 / Hellshazzard
Indirect Syscall implementation to bypass userland NTAPIs hooking.
☆73Updated 7 months ago
Alternatives and similar repositories for Hellshazzard:
Users that are interested in Hellshazzard are comparing it to the libraries listed below
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆59Updated last year
- shell code example☆33Updated last week
- Threadless shellcode injection tool☆63Updated 7 months ago
- ☆125Updated 6 months ago
- A collection of position independent coding resources☆67Updated last month
- Shellcode loader☆77Updated 3 months ago
- ☆96Updated 2 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 8 months ago
- ☆61Updated 9 months ago
- Malware?☆69Updated 5 months ago
- ☆95Updated 6 months ago
- BOF with Synthetic Stackframe☆137Updated 3 weeks ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated last year
- TypeLib persistence technique☆108Updated 5 months ago
- ☆28Updated 7 months ago
- stack spoofing☆80Updated 4 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆106Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆42Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆23Updated 4 months ago
- Find DLLs with RWX section☆78Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆68Updated last year