Idov31 / NidhoggScript
NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg
☆47Updated last year
Alternatives and similar repositories for NidhoggScript:
Users that are interested in NidhoggScript are comparing it to the libraries listed below
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- Do some DLL SideLoading magic☆80Updated last year
- Create Anti-Copy DRM Malware☆55Updated 7 months ago
- ☆106Updated last month
- ☆150Updated 8 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆90Updated 9 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- ☆127Updated 7 months ago
- ☆121Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆60Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆79Updated 5 months ago
- Section-based payload obfuscation technique for x64☆59Updated 8 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆86Updated 9 months ago
- A Mythic agent for Windows written in C☆115Updated last week
- Windows Thread Pool Injection Havoc Implementation☆28Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- I have documented all of the AMSI patches that I learned till now☆71Updated 2 weeks ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆111Updated 2 months ago
- Shellcode loader☆79Updated 4 months ago
- ☆79Updated last year
- ☆54Updated 5 months ago
- A BOF to enumerate system process, their protection levels, and more.☆116Updated 4 months ago
- ☆104Updated 3 weeks ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆81Updated last week
- Work, timer, and wait callback example using solely Native Windows APIs.☆87Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆74Updated last month
- TypeLib persistence technique☆110Updated 5 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 11 months ago
- ☆107Updated 2 months ago