Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection
☆74Dec 26, 2025Updated 3 months ago
Alternatives and similar repositories for GhostlyHollowingViaTamperedSyscalls2
Users that are interested in GhostlyHollowingViaTamperedSyscalls2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆37Jul 1, 2025Updated 9 months ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 3 months ago
- A C# PE loader for x64 and x86 PE files.☆51Mar 9, 2026Updated last month
- Remote DLL Injection with Timer-based Shellcode Execution☆192Jul 18, 2025Updated 9 months ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆94Jan 2, 2026Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 9 months ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- UDC2 implementation that provides an ICMP C2 channel☆120Nov 24, 2025Updated 4 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated last month
- The PoC for CVE-2025-70795 / CVE-2026-0828 and updated driver☆44Mar 13, 2026Updated last month
- Bof of RegPwn by MDSec☆117Mar 15, 2026Updated last month
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆88Apr 4, 2026Updated 2 weeks ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 3 months ago
- a BOF implementation of various registry persistence methods☆97Nov 11, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆65Mar 27, 2026Updated 3 weeks ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆102Apr 9, 2026Updated last week
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- An evil MCP server used for redteam testing☆30Apr 12, 2026Updated last week
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆99Jan 10, 2026Updated 3 months ago
- Shellcode loader☆105Nov 24, 2024Updated last year
- A cross-platform C++ framework for building Windows shellcode☆169Mar 4, 2026Updated last month
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 9 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- ☆20Sep 6, 2025Updated 7 months ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 months ago
- Notion C2 Profile for Mythic☆43Mar 3, 2026Updated last month
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 3 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆307Feb 2, 2026Updated 2 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆216Aug 21, 2025Updated 7 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- One WSL BOF to rule them all☆174Jan 14, 2026Updated 3 months ago
- List web account manager (WAM) accounts added to the current profile☆26Dec 11, 2025Updated 4 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆40Aug 5, 2025Updated 8 months ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆40Nov 11, 2025Updated 5 months ago