GetRektBoy724 / Breaking-Detecting-Direct-Syscall-TechniquesLinks
A repository filled with ideas to break/detect direct syscall techniques
☆27Updated 3 years ago
Alternatives and similar repositories for Breaking-Detecting-Direct-Syscall-Techniques
Users that are interested in Breaking-Detecting-Direct-Syscall-Techniques are comparing it to the libraries listed below
Sorting:
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Updated 4 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Updated 3 years ago
- Process Injection: APC Injection☆32Updated 4 years ago
- ☆62Updated 3 years ago
- One gate to all syscalls!☆23Updated 3 years ago
- ☆41Updated 4 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 3 years ago
- ☆43Updated 2 years ago
- ☆58Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 4 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 4 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.