OtterHacker / HookerLinks
☆107Updated 7 months ago
Alternatives and similar repositories for Hooker
Users that are interested in Hooker are comparing it to the libraries listed below
Sorting:
- ☆155Updated 6 months ago
- A Mythic Agent written in PIC C.☆190Updated 4 months ago
- "Service-less" driver loading☆155Updated 6 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Impersonate Tokens using only NTAPI functions☆75Updated 2 months ago
- A collection of position independent coding resources☆79Updated 4 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 10 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆110Updated last month
- ☆110Updated 5 months ago
- Find DLLs with RWX section☆81Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 10 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆90Updated last year
- A BOF to enumerate system process, their protection levels, and more.☆116Updated 6 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆44Updated last month
- ☆110Updated 7 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 2 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated last month
- shell code example☆49Updated last month
- ☆132Updated 4 months ago
- Stage 0☆161Updated 6 months ago
- ☆108Updated 3 months ago
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- ☆125Updated 9 months ago
- ForsHops☆139Updated 2 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆82Updated 4 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- Local & remote Windows DLL Proxying☆164Updated last year
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago