Various methods of executing shellcode
☆74Mar 27, 2023Updated 3 years ago
Alternatives and similar repositories for WinMalDev
Users that are interested in WinMalDev are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated 2 years ago
- Load a dynamic library from memory by modifying the native Windows loader☆293Updated this week
- C++ self-Injecting dropper based on various EDR evasion techniques.☆432Feb 11, 2024Updated 2 years ago
- Generate Shellcode Loaders & Injects☆159May 15, 2023Updated 2 years ago
- UUID based Shellcode loader for your favorite C2☆86Dec 8, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 3 years ago
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆62Sep 6, 2021Updated 4 years ago
- Walks through the 4-level paging structures in Windows x64☆14Feb 12, 2023Updated 3 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆295Jul 15, 2023Updated 2 years ago
- Implementation of several code injection techniques.☆23Mar 12, 2022Updated 4 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆34Aug 16, 2023Updated 2 years ago
- collection of apis used in malware development☆231Aug 2, 2022Updated 3 years ago
- A Bumblebee-inspired Crypter☆80Dec 5, 2022Updated 3 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆141Sep 12, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆413Jan 11, 2026Updated 3 months ago
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆138Mar 3, 2025Updated last year
- This repository implements Threadless Injection in C☆172Dec 23, 2023Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 5 months ago
- ☆780Oct 17, 2023Updated 2 years ago
- Read Memory without ReadProcessMemory for Current Process☆92Feb 13, 2022Updated 4 years ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆312Aug 2, 2023Updated 2 years ago
- Performing Indirect Clean Syscalls☆611Apr 19, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- Bypass Malware Time Delays☆105Sep 23, 2022Updated 3 years ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆187Aug 2, 2023Updated 2 years ago
- RunPE implementation with multiple evasive techniques (1)☆386Sep 22, 2023Updated 2 years ago
- Tools and PoCs for Windows syscall investigation.