Detect userland hooks placed by AV/EDR
☆28Sep 4, 2023Updated 2 years ago
Alternatives and similar repositories for DetectHooks
Users that are interested in DetectHooks are comparing it to the libraries listed below
Sorting:
- Erebus is a payload generator written in Nim.☆16Jun 13, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Jan 21, 2024Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- ☆23Apr 28, 2024Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆97Aug 27, 2023Updated 2 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Basic interactive Windows kernel offensive toolkit written in C☆137Sep 20, 2025Updated 5 months ago
- Evasive Golang Loader☆136Jul 27, 2024Updated last year
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 7 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆62May 1, 2023Updated 2 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- ☆19Sep 17, 2025Updated 5 months ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Check robustness of your (their) Active Directory accounts passwords☆45Mar 5, 2025Updated 11 months ago
- ☆103Sep 5, 2023Updated 2 years ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- CVE-2018-6066 using VBA☆68Oct 24, 2022Updated 3 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆25Oct 13, 2025Updated 4 months ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- shell code example☆68Dec 12, 2025Updated 2 months ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Nov 14, 2022Updated 3 years ago
- ☆150Mar 22, 2024Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- PE obfuscator with Evasion in mind☆213Apr 25, 2023Updated 2 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Oct 24, 2023Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Jul 7, 2022Updated 3 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago