Faran-17 / Windows-Internals
Important notes and topics on my journey towards mastering Windows Internals
☆358Updated 8 months ago
Alternatives and similar repositories for Windows-Internals:
Users that are interested in Windows-Internals are comparing it to the libraries listed below
- The Definitive Guide To Process Cloning on Windows☆450Updated last year
- Cybersecurity research results. Simple C/C++ and Python implementations☆201Updated last week
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆617Updated 3 months ago
- PoCs and tools for investigation of Windows process execution techniques☆890Updated 2 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆513Updated 9 months ago
- Performing Indirect Clean Syscalls☆508Updated last year
- Win32 and Kernel abusing techniques for pentesters☆937Updated last year
- A small x64 library to load dll's into memory.☆430Updated last year
- Analyse your malware to surgically obfuscate it☆439Updated last week
- ☆470Updated 2 years ago
- PoCs for Kernelmode rootkit techniques research.☆351Updated last week
- ☆331Updated last year
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆631Updated 2 years ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆646Updated last year
- PoC Implementation of a fully dynamic call stack spoofer☆736Updated 6 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆332Updated 7 months ago
- My collection of malware dev links☆252Updated 4 months ago
- TartarusGate, Bypassing EDRs☆560Updated 3 years ago
- For when DLLMain is the only way☆362Updated 3 months ago
- Sleep Obfuscation☆711Updated last year
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆442Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆484Updated 2 years ago
- A tutorial on how to write a packer for Windows!☆252Updated last year
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆631Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆238Updated 2 months ago
- Tools and PoCs for Windows syscall investigation.☆357Updated 3 weeks ago
- Side-by-side comparison of the Windows and Linux (GNU) Loaders☆298Updated 4 months ago
- My notes while studying Windows exploitation☆185Updated last year
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆478Updated 11 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆671Updated this week