Slowerzs / PPLSystemLinks
☆190Updated last year
Alternatives and similar repositories for PPLSystem
Users that are interested in PPLSystem are comparing it to the libraries listed below
Sorting:
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆261Updated 10 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆303Updated 3 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆265Updated 9 months ago
- ROP-based sleep obfuscation to evade memory scanners☆357Updated this week
- Bypass LSA protection using the BYODLL technique☆164Updated 9 months ago
- Exploitation of process killer drivers☆201Updated last year
- An example reference design for a proposed BOF PE☆175Updated 2 months ago
- A set of programs for analyzing common vulnerabilities in COM☆215Updated 9 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆334Updated 2 years ago
- EDRSandblast-GodFault☆266Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆294Updated 2 years ago
- DLL proxying for lazy people☆175Updated 6 months ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆151Updated 7 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆188Updated 6 months ago
- Reuse open handles to dynamically dump LSASS.☆246Updated last year
- Generic PE loader for fast prototyping evasion techniques☆233Updated 11 months ago
- This repository implements Threadless Injection in C☆168Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆369Updated 6 months ago
- Rust For Windows Cheatsheet☆120Updated 7 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆218Updated 4 months ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆197Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆161Updated last year
- Patch AMSI and ETW☆240Updated last year
- An App Domain Manager Injection DLL PoC on steroids☆173Updated last year
- Extracting NetNTLM without touching lsass.exe☆238Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆184Updated 4 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆293Updated last year
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆221Updated last month
- Sleep obfuscation☆228Updated 6 months ago
- Windows rootkit designed to work with BYOVD exploits☆200Updated 5 months ago