SolomonSklash / UnhookingPOC
A small commented POC for removing API hooks placed by AV/EDR.
☆33Updated 4 years ago
Related projects: ⓘ
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆39Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- A simple COM server which provides a component to run shellcode☆131Updated 4 years ago
- ☆36Updated 3 years ago
- ☆14Updated 2 years ago
- C++ implant that interfaces with a SK8PARK server☆47Updated 3 years ago
- ☆48Updated 4 years ago
- ☆58Updated 2 years ago
- ☆23Updated 2 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 2 years ago
- ☆31Updated this week
- ☆17Updated 3 years ago
- A C port of b33f's UrbanBishop☆35Updated 3 years ago
- ☆79Updated 2 years ago
- Loads .NET Assembly Via CLR Loader☆14Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 2 years ago
- Extended Process List (Search functionality)☆27Updated 3 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆14Updated 3 years ago
- ☆50Updated this week
- ☆36Updated 2 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆30Updated 4 years ago
- ☆53Updated 2 years ago
- all credits go to @mgeeky☆58Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆27Updated 2 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆97Updated last year
- Injects shellcode into remote processes using direct syscalls☆74Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆75Updated last year
- Piece of code to detect and remove hooks in IAT☆51Updated 2 years ago