Kara-4search / ProcessHollowing_CSharpLinks
ProcessHollowing via csharp
☆13Updated 4 years ago
Alternatives and similar repositories for ProcessHollowing_CSharp
Users that are interested in ProcessHollowing_CSharp are comparing it to the libraries listed below
Sorting:
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆62Updated 4 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆57Updated 2 years ago
- MappingInjection via csharp☆40Updated 4 years ago
- HookDetection☆45Updated 4 years ago
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- Get your data from the resource section manually, with no need for windows apis☆65Updated last year
- It stinks☆103Updated 3 years ago
- Bypass AMSI☆13Updated 4 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 4 years ago
- Inject shellcode into process via "EarlyBird"☆26Updated 4 years ago
- C++ WinRM API via Reflective DLL☆145Updated 4 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆82Updated 3 years ago
- LOCAL AND REMOTE HOOK msv1_0!SpAcceptCredentials from LSASS.exe and DUMP DOMAIN/LOGIN/PASSWORD IN CLEARTEXT to text file.☆122Updated 5 years ago
- Process inject technique "Thread hijacking" via csharp☆15Updated 4 years ago
- Exploring in-memory execution of .NET☆138Updated 3 years ago
- My implementation of Halo's Gate technique in C#☆54Updated 3 years ago
- Overwrite a process's recovery callback and execute with WER☆103Updated 3 years ago
- Extracting Syscall Stub, Modernized☆66Updated 3 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆60Updated 3 years ago
- Load PE via XML Attribute☆32Updated 5 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆84Updated 6 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 4 years ago
- ☆58Updated 3 years ago
- My personal shellcode loader☆32Updated 2 years ago
- Command line & PPID spoofing☆27Updated 2 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆17Updated 3 years ago
- RunPE using Hell's Gate technique.☆32Updated 5 years ago
- Bypassing ETW with Csharp☆26Updated 4 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆110Updated 2 years ago
- ☆38Updated 5 years ago