OtterHacker / HookerLinks
☆107Updated 8 months ago
Alternatives and similar repositories for Hooker
Users that are interested in Hooker are comparing it to the libraries listed below
Sorting:
- Construct the payload at runtime using an array of offsets☆63Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- .NET tool used to enrich RPC telemetry☆87Updated last month
- Impersonate Tokens using only NTAPI functions☆77Updated 3 months ago
- ☆155Updated 7 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 11 months ago
- Find DLLs with RWX section☆81Updated 2 years ago
- Utilizng an MCP Server to communicate with your C2☆75Updated 2 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 3 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆120Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50Updated last year
- A collection of position independent coding resources☆79Updated 5 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆129Updated 3 weeks ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆75Updated 11 months ago
- A Mythic Agent written in PIC C.☆190Updated 5 months ago
- "Service-less" driver loading☆155Updated 7 months ago
- ☆76Updated 11 months ago
- ☆111Updated 7 months ago
- ☆132Updated 5 months ago
- ☆143Updated 8 months ago
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- ☆110Updated 5 months ago
- Local & remote Windows DLL Proxying☆165Updated last year
- shell code example☆49Updated last month
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- Section-based payload obfuscation technique for x64☆61Updated 11 months ago
- Code execution/injection technique using DLL PEB module structure manipulation☆129Updated last month
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆115Updated 7 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆90Updated last year
- ☆66Updated 5 months ago