Unprotect-Project / FuncInEvasionTechniqueDemoLinks
☆34Updated last year
Alternatives and similar repositories for FuncInEvasionTechniqueDemo
Users that are interested in FuncInEvasionTechniqueDemo are comparing it to the libraries listed below
Sorting:
- Persistence via Shell Extensions☆62Updated last year
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- ☆32Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- API Hammering with C++20☆49Updated 2 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆33Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- BYOVD collection☆23Updated last year
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated last year
- ☆22Updated last year
- A more reliable way of resolving syscall numbers in Windows☆51Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆38Updated 2 years ago
- ☆37Updated 2 years ago
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- Modify managed functions from unmanaged code☆52Updated last year
- Self delete DLL (2)☆14Updated last year
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- Self Delete DLL☆23Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 11 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- ☆31Updated 3 months ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 10 months ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆54Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆62Updated 11 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago