UmaRex01 / Hit-And-Run
A method to execute syscalls while bypassing EDR's function hooking and call stack analysis.
☆13Updated 2 weeks ago
Alternatives and similar repositories for Hit-And-Run
Users that are interested in Hit-And-Run are comparing it to the libraries listed below
Sorting:
- An implementation of an indirect system call☆126Updated last year
- find dll base addresses without PEB WALK☆78Updated last week
- shellcode生成框架☆85Updated 10 months ago
- Beacon compiled using clang☆66Updated 2 years ago
- UAC Bypass using UIAccess program QuickAssist☆85Updated 2 months ago
- vehsyscall:a syscall project that may bypass EDR☆59Updated last year
- ☆47Updated last year
- It stinks☆102Updated 3 years ago
- ☆30Updated last year
- Evasive loader to bypass static detection☆60Updated last year
- Help red teams find opsec processes during engagements☆40Updated 5 months ago
- Load static-compiled PE from remote server.☆61Updated 3 years ago
- A basic C2 framework written in C☆61Updated 10 months ago
- Self Cleanup in post-ex job☆55Updated 8 months ago
- A Simple PoC☆21Updated 11 months ago
- Use COM Component Bypass UAC,Dll Version☆34Updated 4 years ago
- A Cobalt Strike memory evasion loader for redteamers☆99Updated 2 years ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆47Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆48Updated 2 months ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆63Updated 2 years ago
- bring your own vulnerable driver☆95Updated last year
- Efficient RAT signature locator for bypassing AV/EDR, supporting static scanning and memory scanning.☆42Updated 6 months ago
- An easy-to-use and powerful Macro for Stack Spoofing.☆20Updated 4 months ago
- more conveniently Visual-Studio-BOF-template☆64Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆102Updated last year
- A runtime for developing large-scale and complex shellcode.☆19Updated this week
- ☆26Updated last year
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆63Updated 2 years ago
- 自定义函数堆栈,从而绕过ETW检测,这个是完整版。☆14Updated last year
- ☆49Updated 2 years ago