NotokDay / NTProcessInjector
Process injection via native Windows APIs (NTAPIs)
☆15Updated last year
Alternatives and similar repositories for NTProcessInjector:
Users that are interested in NTProcessInjector are comparing it to the libraries listed below
- A pure C version of SymProcAddress☆25Updated 11 months ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆14Updated 9 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 7 months ago
- ☆23Updated 3 weeks ago
- ☆24Updated this week
- API Hammering with C++20☆45Updated 2 years ago
- An example of COM hijacking using a proxy DLL.☆27Updated 3 years ago
- Just another Process Injection using Process Hollowing technique.☆16Updated last year
- ☆29Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- ☆68Updated 6 months ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆24Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 6 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated 11 months ago
- ☆58Updated last year
- Detect userland hooks placed by AV/EDR☆26Updated last year
- shell code example☆27Updated this week
- RunPE adapted for x64 and written in C, does not use RWX☆23Updated 9 months ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆30Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆49Updated 6 months ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆22Updated 7 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆30Updated 7 months ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 9 months ago
- A more reliable way of resolving syscall numbers in Windows☆48Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆46Updated 5 months ago
- ☆52Updated 3 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year