Faran-17 / Windows-Internals
Important notes and topics on my journey towards mastering Windows Internals
☆374Updated 11 months ago
Alternatives and similar repositories for Windows-Internals:
Users that are interested in Windows-Internals are comparing it to the libraries listed below
- A small x64 library to load dll's into memory.☆436Updated last year
- Performing Indirect Clean Syscalls☆526Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆662Updated 3 weeks ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆469Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆532Updated last month
- PoCs and tools for investigation of Windows process execution techniques☆912Updated 3 weeks ago
- Win32 and Kernel abusing techniques for pentesters☆947Updated last year
- The Definitive Guide To Process Cloning on Windows☆465Updated last year
- Cybersecurity research results. Simple C/C++ and Python implementations☆214Updated 3 weeks ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆488Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆633Updated 2 years ago
- ☆346Updated last year
- Sleep Obfuscation☆735Updated last year
- TartarusGate, Bypassing EDRs☆577Updated 3 years ago
- PoCs for Kernelmode rootkit techniques research.☆364Updated 2 months ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆659Updated last year
- PoC Implementation of a fully dynamic call stack spoofer☆757Updated 8 months ago
- Tools and PoCs for Windows syscall investigation.☆358Updated 3 months ago
- Analyse your malware to surgically obfuscate it☆457Updated last month
- A tutorial on how to write a packer for Windows!☆264Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆335Updated last month
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆482Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆369Updated 3 months ago
- Collect Windows telemetry for Maldev☆324Updated last month
- Operating System Design Review: A systemic analysis of modern systems architecture☆307Updated last month
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆844Updated 2 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆690Updated 2 months ago
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆426Updated last year
- My collection of malware dev links☆263Updated 7 months ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆446Updated last year