ShorSec / DllNotificationInjectionLinks
A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes.
☆29Updated 2 years ago
Alternatives and similar repositories for DllNotificationInjection
Users that are interested in DllNotificationInjection are comparing it to the libraries listed below
Sorting:
- TypeLib persistence technique☆131Updated 10 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆48Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆55Updated last year
- ☆40Updated 9 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆61Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- ☆37Updated 2 years ago
- Get your data from the resource section manually, with no need for windows apis☆64Updated 10 months ago
- ☆100Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆121Updated 2 years ago
- ☆38Updated 2 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆67Updated last year
- Linker for Beacon Object Files☆128Updated this week
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆106Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆56Updated 4 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated last year
- ☆93Updated last year
- Various methods of executing shellcode☆72Updated 2 years ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆99Updated 6 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆131Updated 7 months ago
- I have documented all of the AMSI patches that I learned till now☆73Updated 5 months ago
- Threadless shellcode injection tool☆67Updated last year
- ForsHops☆58Updated 5 months ago
- ☆23Updated 6 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆86Updated 2 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆85Updated 2 years ago
- Template-based generation of shellcode loaders☆79Updated last year
- ☆61Updated last year