☆25Dec 7, 2024Updated last year
Alternatives and similar repositories for Windows-Defender-DLL-Hijacking
Users that are interested in Windows-Defender-DLL-Hijacking are comparing it to the libraries listed below
Sorting:
- Mind-Maps of Several Things☆12Dec 22, 2021Updated 4 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- ☆21Jul 26, 2022Updated 3 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18May 23, 2022Updated 3 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- GhostSec Scam Detection Tool☆15Feb 11, 2021Updated 5 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago
- ☆40Jul 30, 2023Updated 2 years ago
- SHELLCTF 2021 WriteUps. A beginner-friendly CTF with an objective to get the enthusiastic students familiar with the basics, along with a…☆12Jun 7, 2021Updated 4 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- Custom mini tools during Red Teaming engagements☆23Mar 7, 2026Updated last week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆10Jun 18, 2020Updated 5 years ago
- random scripts☆17Nov 10, 2024Updated last year
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Apr 17, 2021Updated 4 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- ☆10Nov 17, 2021Updated 4 years ago
- Exploring different process injection techniques based on malware analysis☆14Dec 28, 2023Updated 2 years ago
- ☆12Oct 21, 2024Updated last year
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated 11 months ago
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 6 months ago
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 6 months ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆28Jun 2, 2024Updated last year
- Process injection via native Windows APIs (NTAPIs)☆15Jan 16, 2024Updated 2 years ago
- Collection of different rootkit functionality, each driver representing a different rootkit component☆13May 27, 2025Updated 9 months ago
- Gitbook: kashz-Jewels☆21Jul 1, 2025Updated 8 months ago
- ☆17May 22, 2024Updated last year