Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping
☆70Oct 9, 2022Updated 3 years ago
Alternatives and similar repositories for herpaderply_hollowing
Users that are interested in herpaderply_hollowing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆582Mar 8, 2024Updated 2 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Bypass windows eventlogs & Sysmon☆20Aug 24, 2021Updated 4 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆74Feb 11, 2024Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Feb 2, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Load a dynamic library from memory by modifying the native Windows loader☆293Updated this week
- PE loader with various shellcode injection techniques☆450Oct 17, 2022Updated 3 years ago
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Jan 14, 2025Updated last year
- Performing Indirect Clean Syscalls☆611Apr 19, 2023Updated 3 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆642Aug 30, 2022Updated 3 years ago
- ☆276Jan 14, 2023Updated 3 years ago
- Minifilter Callback Patching Proof-of-Concept☆75Oct 31, 2022Updated 3 years ago
- ☆34Apr 5, 2017Updated 9 years ago
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆313Dec 9, 2023Updated 2 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated 2 years ago
- Yet another variant of Process Hollowing☆465Jul 31, 2025Updated 8 months ago
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆691Mar 11, 2024Updated 2 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆251Jul 9, 2024Updated last year
- ☆113Oct 10, 2022Updated 3 years ago
- Beacon Object Files.☆36Feb 26, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆143Feb 2, 2026Updated 2 months ago
- A PoC implementation for dynamically masking call stacks with timers.☆310Feb 13, 2023Updated 3 years ago
- Silence EDRs by removing kernel callbacks☆239Dec 7, 2020Updated 5 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- The code is a pingback to the Dark Vortex blog: https://0xdarkvortex.dev/hiding-memory-allocations-from-mdatp-etwti-stack-tracing/☆211Jan 29, 2023Updated 3 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆284Apr 17, 2023Updated 3 years ago
- POC for frustrating/defeating Malware Analysts☆156Jun 12, 2022Updated 3 years ago
- A Reflective Loader for macOS☆149Jul 20, 2025Updated 9 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆266Oct 16, 2024Updated last year
- Windows x64 kernel mode rootkit process hollowing POC.☆191Jun 30, 2023Updated 2 years ago
- Linux Sleep Obfuscation☆115Jan 7, 2024Updated 2 years ago
- ☆19Nov 28, 2024Updated last year
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆83Feb 2, 2026Updated 2 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,190Jul 5, 2023Updated 2 years ago