Hagrid29 / herpaderply_hollowingView external linksLinks
Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping
☆67Oct 9, 2022Updated 3 years ago
Alternatives and similar repositories for herpaderply_hollowing
Users that are interested in herpaderply_hollowing are comparing it to the libraries listed below
Sorting:
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Feb 2, 2026Updated 2 weeks ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆71Feb 11, 2024Updated 2 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆581Mar 8, 2024Updated last year
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Bypass windows eventlogs & Sysmon☆20Aug 24, 2021Updated 4 years ago
- Beacon Object Files.☆36Feb 26, 2024Updated last year
- ☆274Jan 14, 2023Updated 3 years ago
- PE loader with various shellcode injection techniques☆448Oct 17, 2022Updated 3 years ago
- Load a dynamic library from memory by modifying the native Windows loader☆282Jun 18, 2025Updated 7 months ago
- Minifilter Callback Patching Proof-of-Concept☆73Oct 31, 2022Updated 3 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆638Aug 30, 2022Updated 3 years ago
- Performing Indirect Clean Syscalls☆603Apr 19, 2023Updated 2 years ago
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Jan 14, 2025Updated last year
- ☆11Nov 12, 2023Updated 2 years ago
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆307Dec 9, 2023Updated 2 years ago
- ☆34Apr 5, 2017Updated 8 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- Linux Sleep Obfuscation☆107Jan 7, 2024Updated 2 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆246Jul 9, 2024Updated last year
- The code is a pingback to the Dark Vortex blog: https://0xdarkvortex.dev/hiding-memory-allocations-from-mdatp-etwti-stack-tracing/☆210Jan 29, 2023Updated 3 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆82Feb 2, 2026Updated 2 weeks ago
- Silence EDRs by removing kernel callbacks☆239Dec 7, 2020Updated 5 years ago
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago
- A PoC implementation for dynamically masking call stacks with timers.☆310Feb 13, 2023Updated 3 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆273Apr 17, 2023Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Windows x64 kernel mode rootkit process hollowing POC.☆189Jun 30, 2023Updated 2 years ago
- A Reflective Loader for macOS☆146Jul 20, 2025Updated 6 months ago
- POC for frustrating/defeating Malware Analysts☆156Jun 12, 2022Updated 3 years ago
- Yet another variant of Process Hollowing☆426Jul 31, 2025Updated 6 months ago
- A bunch of scripts and code i wrote.☆149Nov 7, 2024Updated last year
- ☆19Nov 28, 2024Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Sleep obfuscation☆267Dec 13, 2024Updated last year
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆682Mar 11, 2024Updated last year
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆243Jan 4, 2023Updated 3 years ago