Detect userland hooks placed by AV/EDR
☆28Sep 4, 2023Updated 2 years ago
Alternatives and similar repositories for DetectHooks
Users that are interested in DetectHooks are comparing it to the libraries listed below
Sorting:
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆137Sep 20, 2025Updated 6 months ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆97Aug 27, 2023Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- ☆24Apr 28, 2024Updated last year
- Evasive Golang Loader☆137Jul 27, 2024Updated last year
- ☆104Sep 5, 2023Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 8 months ago
- ☆26Mar 10, 2022Updated 4 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Oct 24, 2023Updated 2 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆62May 1, 2023Updated 2 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- shell code example☆68Dec 12, 2025Updated 3 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Detection Engineering Tools☆25Mar 13, 2026Updated last week
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆26Oct 13, 2025Updated 5 months ago
- PE obfuscator with Evasion in mind☆213Apr 25, 2023Updated 2 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Jul 7, 2022Updated 3 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆85Aug 13, 2024Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Nov 14, 2022Updated 3 years ago
- ErebusGate for Nim Bypass AV/EDR☆161Nov 7, 2022Updated 3 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- ☆19Sep 17, 2025Updated 6 months ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago