Vasco0x4 / SimpleProcessHollowingLinks
simple shellcode injector for Windows / Process Hollowing
☆15Updated last year
Alternatives and similar repositories for SimpleProcessHollowing
Users that are interested in SimpleProcessHollowing are comparing it to the libraries listed below
Sorting:
- BYOVD Technique Example using viragt64 driver☆68Updated last year
- The tool used to clone the digital signatures of legitimate programs☆55Updated 3 months ago
- Shellcode encryption in RC4 and process injection into explorer.exe.☆36Updated 2 years ago
- Rex Shellcode Loader for AV/EDR evasion☆35Updated last year
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆18Updated 9 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated this week
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Updated 6 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆51Updated last year
- Core Submodule of Exploration C2☆23Updated last week
- Change hash for a signed pe☆17Updated 2 years ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆50Updated 8 months ago
- Windows C++ Implant for Exploration C2☆45Updated 2 weeks ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66Updated 2 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆75Updated 3 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆166Updated 8 months ago
- ☆57Updated 2 years ago
- ☆62Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆113Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆64Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆129Updated 2 months ago
- My personal shellcode loader☆32Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Updated 2 years ago
- NSecSoftBYOVD POC☆54Updated 4 months ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆36Updated 4 years ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆51Updated last year
- Artemis - C++ Hell's Gate Syscall Implementation☆34Updated 2 years ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆61Updated 5 months ago
- TypeLib persistence technique☆139Updated last year
- AV/EDR killer using BYOVD technique☆43Updated last year