Bypass user-land hooks by syscall tampering via the Trap Flag
☆138Aug 25, 2025Updated 6 months ago
Alternatives and similar repositories for TrapFlagForSyscalling
Users that are interested in TrapFlagForSyscalling are comparing it to the libraries listed below
Sorting:
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 9 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Linux Process Injection via Seccomp Notifier☆84Dec 9, 2025Updated 2 months ago
- early cascade injection PoC based on Outflanks blog post☆237Nov 7, 2024Updated last year
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated 11 months ago
- Mentally ill EtwTi parser☆68Jan 11, 2026Updated last month
- ☆54Oct 13, 2025Updated 4 months ago
- List web account manager (WAM) accounts added to the current profile☆22Dec 11, 2025Updated 2 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆137Aug 31, 2025Updated 6 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- A small How-To on creating your own weaponized WSL file☆121Jul 23, 2025Updated 7 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆79Dec 23, 2023Updated 2 years ago
- Detect BypassUAC using AMSI☆29Feb 18, 2025Updated last year
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆295Nov 1, 2025Updated 4 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆186Jan 17, 2026Updated last month
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆199Jun 17, 2025Updated 8 months ago
- ☆108Aug 21, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆298Jul 31, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- Generate an Alphabetical Polymorphic Shellcode☆138Aug 19, 2025Updated 6 months ago
- find dll base addresses without PEB WALK☆160Jul 13, 2025Updated 7 months ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- BOF with Synthetic Stackframe☆230Oct 30, 2025Updated 4 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆97Mar 20, 2023Updated 2 years ago
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- ☆198Mar 28, 2025Updated 11 months ago
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- RunPE implementation with multiple evasive techniques (2)☆273Sep 25, 2025Updated 5 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆66Dec 15, 2025Updated 2 months ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆606Feb 2, 2026Updated last month
- ☆30May 23, 2024Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year