Logan-Elliott / HollowGhost
Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.
☆19Updated last year
Alternatives and similar repositories for HollowGhost:
Users that are interested in HollowGhost are comparing it to the libraries listed below
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆60Updated this week
- Havoc C2 profile generator☆77Updated 6 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆150Updated last year
- a port of privkit bof for havoc☆23Updated last year
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆105Updated 4 months ago
- ☆153Updated 8 months ago
- Malicious powershell scripts loader designed to avoid detection.☆51Updated last year
- 🧠 The ultimate, community-curated resource for Beacon Object Files (BOFs) — tutorials, how-tos, deep dives, and reference materials.☆60Updated this week
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆71Updated 5 months ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆160Updated 10 months ago
- .bin file to shellcode convertor☆34Updated 9 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆155Updated last month
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆47Updated 11 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆89Updated 10 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆52Updated 2 weeks ago
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- .NET assembly loader with patchless AMSI and ETW bypass in Rust☆46Updated 6 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆88Updated this week
- BOF with Synthetic Stackframe☆143Updated 2 months ago
- ☆108Updated 3 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆69Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- ☆114Updated last month
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆92Updated 2 weeks ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆62Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated 11 months ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆144Updated last month
- Shellcode loader☆81Updated 5 months ago