ProcessusT / UnhookingDLL
This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hollowing
☆69Updated last year
Alternatives and similar repositories for UnhookingDLL:
Users that are interested in UnhookingDLL are comparing it to the libraries listed below
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 3 years ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆25Updated 6 months ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆82Updated last year
- Sleep Obfuscation☆45Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆80Updated 2 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- Get your data from the resource section manually, with no need for windows apis☆61Updated 6 months ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆55Updated 2 years ago
- ☆36Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- Artemis - C++ Hell's Gate Syscall Implementation☆33Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆63Updated 2 years ago
- ☆48Updated 2 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆51Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆101Updated last year
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated last year
- Halos Gate-based NTAPI Unhooker☆52Updated 3 years ago
- I have documented all of the AMSI patches that I learned till now☆72Updated last month
- Various methods of executing shellcode☆70Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- API Hammering with C++20☆46Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Do some DLL SideLoading magic☆84Updated last year
- ☆128Updated last year
- Red Team Operation's Defense Evasion Technique.☆53Updated 11 months ago
- ☆36Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year