Kara-4search / ProcessHollowing_CSharpLinks
ProcessHollowing via csharp
☆13Updated 4 years ago
Alternatives and similar repositories for ProcessHollowing_CSharp
Users that are interested in ProcessHollowing_CSharp are comparing it to the libraries listed below
Sorting:
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆57Updated 2 years ago
- MappingInjection via csharp☆40Updated 4 years ago
- HookDetection☆45Updated 4 years ago
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆62Updated 4 years ago
- Bypass AMSI☆13Updated 4 years ago
- Inject shellcode into process via "EarlyBird"☆26Updated 4 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 4 years ago
- Get your data from the resource section manually, with no need for windows apis☆66Updated last year
- Command line & PPID spoofing☆27Updated 2 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆61Updated 3 years ago
- Process inject technique "Thread hijacking" via csharp☆15Updated 4 years ago
- Overwrite a process's recovery callback and execute with WER☆103Updated 3 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆107Updated 2 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆34Updated 4 years ago
- Exploring in-memory execution of .NET☆138Updated 3 years ago
- Extracting Syscall Stub, Modernized☆66Updated 3 years ago
- Load PE via XML Attribute☆32Updated 5 years ago
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- My personal shellcode loader☆32Updated 2 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆84Updated 6 years ago
- It stinks☆104Updated 3 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆82Updated 3 years ago
- C++ WinRM API via Reflective DLL☆145Updated 4 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆36Updated 4 years ago
- RunPE using Hell's Gate technique.☆32Updated 5 years ago
- ☆58Updated 3 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Updated 4 years ago
- Bypassing ETW with Csharp☆26Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆157Updated 4 years ago