Kara-4search / ProcessHollowing_CSharp
ProcessHollowing via csharp
☆12Updated 3 years ago
Alternatives and similar repositories for ProcessHollowing_CSharp:
Users that are interested in ProcessHollowing_CSharp are comparing it to the libraries listed below
- HookDetection☆46Updated 3 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆54Updated last year
- A Simple ShellcodeLoader☆11Updated 3 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- Process inject technique "Thread hijacking" via csharp☆14Updated 3 years ago
- Load PE via XML Attribute☆30Updated 5 years ago
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- Inject shellcode into process via "EarlyBird"☆26Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- MappingInjection via csharp☆38Updated 3 years ago
- Bypassing ETW with Csharp☆26Updated 3 years ago
- RunPE using Hell's Gate technique.☆32Updated 4 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆44Updated 2 years ago
- ☆38Updated 4 years ago
- x64 version☆34Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆55Updated 3 years ago
- ☆50Updated 4 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆14Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- ☆26Updated 3 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆26Updated 2 years ago
- ComObject Shellcode Loader with fake return address☆12Updated 3 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆32Updated last year
- Bypass AMSI☆14Updated 3 years ago
- ☆20Updated last year
- Get your data from the resource section manually, with no need for windows apis☆61Updated 6 months ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆47Updated 4 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago