Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.
☆51Oct 19, 2025Updated 5 months ago
Alternatives and similar repositories for Detecting-Indirect-Syscalls
Users that are interested in Detecting-Indirect-Syscalls are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Oct 24, 2025Updated 5 months ago
- ☆61Oct 24, 2025Updated 5 months ago
- sideloading PoC using onedrive.exe & version.dll☆93Oct 30, 2025Updated 5 months ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 10 months ago
- Prevent in-process process termination by patching exit APIs☆65Nov 9, 2025Updated 5 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- My implementation of Halo's Gate technique in C#☆54Apr 20, 2022Updated 3 years ago
- Halos Gate-based NTAPI Unhooker☆52Apr 21, 2022Updated 3 years ago
- ☆147Oct 29, 2024Updated last year
- User-Defined C2 BOF Template☆31Nov 24, 2025Updated 4 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆84Nov 15, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- ☆11Sep 8, 2017Updated 8 years ago
- Shh0ya Kernel Hook Driver☆24Dec 8, 2020Updated 5 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulati…☆96Oct 17, 2025Updated 5 months ago
- ☆55May 31, 2025Updated 10 months ago
- ☆10Aug 21, 2024Updated last year
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆54Nov 3, 2025Updated 5 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 5 months ago
- Sylius ^2.0 plugin to support Stripe Checkout and Stripe Web Elements☆10Mar 9, 2026Updated last month
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆73May 14, 2022Updated 3 years ago
- A PoC for Early Cascade process injection technique.☆215Jan 30, 2025Updated last year
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆52Nov 2, 2025Updated 5 months ago
- win api hooks☆15Jun 8, 2017Updated 8 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 10 months ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆26Mar 31, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- ☆29May 16, 2023Updated 2 years ago
- Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable AP…☆62Apr 1, 2026Updated last week
- WIP Java decompiler☆24Dec 3, 2025Updated 4 months ago
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- ☆77Jan 1, 2026Updated 3 months ago
- A collection of scheduling implementations for Java☆15Jan 27, 2026Updated 2 months ago