JLospinoso / cpp-implantLinks
A simple implant showcasing modern C++
☆106Updated 4 years ago
Alternatives and similar repositories for cpp-implant
Users that are interested in cpp-implant are comparing it to the libraries listed below
Sorting:
- Evasive Process Hollowing Techniques☆141Updated 4 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆229Updated 7 months ago
- Simple EDR implementation to demonstrate bypass☆173Updated 5 years ago
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆121Updated 5 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆179Updated 2 months ago
- ☆135Updated 4 months ago
- Experiment on reproducing Obfuscate & Sleep☆145Updated 4 years ago
- Windows user-land hooks manipulation tool.☆144Updated 4 years ago
- Windows System Programming Experiments☆220Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- Managed assembly shellcode generation☆272Updated 4 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆183Updated 3 years ago
- Example code for EDR bypassing☆150Updated 6 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆166Updated 3 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆113Updated 4 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆225Updated 5 years ago
- Project to check which Nt/Zw functions your local EDR is hooking☆193Updated 4 years ago
- DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userla…☆121Updated 3 years ago
- PoC for proxying COM objects when hijacking☆209Updated 5 years ago
- Winsock accept() Backdoor Implant.☆115Updated 4 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆88Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆217Updated 5 years ago
- Dll that can be used for side loading and other attack vector.☆202Updated 4 years ago
- GhostWriting Injection Technique.☆176Updated 7 years ago
- WTSRM☆213Updated 2 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- Userland API Unhooker Project☆109Updated 4 years ago