Maldev-Academy / TrapFlagForSyscallingLinks
Bypass user-land hooks by syscall tampering via the Trap Flag
☆137Updated 4 months ago
Alternatives and similar repositories for TrapFlagForSyscalling
Users that are interested in TrapFlagForSyscalling are comparing it to the libraries listed below
Sorting:
- ☆159Updated last year
- A hoontr must hoont☆100Updated last month
- A Mythic Agent written in PIC C.☆207Updated 11 months ago
- ☆137Updated 11 months ago
- Activation Context Hijack☆168Updated 5 months ago
- A small How-To on creating your own weaponized WSL file☆119Updated 5 months ago
- Internal Monologue BOF☆79Updated last year
- A collection of position independent coding resources☆106Updated 2 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆98Updated this week
- Shellcode injection using the Windows Debugging API☆153Updated last week
- ☆65Updated 2 weeks ago
- ☆140Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution