Create and enumerate hidden desktops.
☆91Dec 12, 2023Updated 2 years ago
Alternatives and similar repositories for HiddenDesktop
Users that are interested in HiddenDesktop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21Feb 6, 2024Updated 2 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆18Dec 12, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆60Dec 15, 2023Updated 2 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- ☆124Oct 9, 2023Updated 2 years ago
- ☆156Oct 2, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 4 months ago
- ☆35Dec 21, 2023Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆627Jan 2, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆25Jul 5, 2023Updated 2 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83May 23, 2023Updated 2 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- EvtPsst☆55Oct 24, 2023Updated 2 years ago
- Inject DLLs into the explorer process using icons☆408May 18, 2025Updated last year
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆202Dec 6, 2022Updated 3 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆434Feb 11, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A C# port from Invoke-GhostTask☆121Jan 5, 2024Updated 2 years ago
- Native Syscalls Shellcode Injector☆269Jul 2, 2023Updated 2 years ago
- RunPE implementation with multiple evasive techniques (1)☆388Sep 22, 2023Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆799Jan 26, 2026Updated 3 months ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆302Feb 2, 2026Updated 3 months ago
- Winsocket for Cobalt Strike.☆105Jul 6, 2023Updated 2 years ago
- ☆131Jun 28, 2023Updated 2 years ago
- ☆79Aug 2, 2023Updated 2 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Feb 11, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Generate Shellcode Loaders & Injects☆159May 15, 2023Updated 3 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆107Sep 22, 2023Updated 2 years ago
- A BOF for lazy people☆24Apr 4, 2024Updated 2 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆64Apr 4, 2026Updated last month
- A POC to disable TamperProtection and other Defender / MDE components☆257Jun 6, 2024Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 3 years ago