Xacone / Eneio64-Driver-Exploit
Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W
☆14Updated this week
Alternatives and similar repositories for Eneio64-Driver-Exploit:
Users that are interested in Eneio64-Driver-Exploit are comparing it to the libraries listed below
- RunPE adapted for x64 and written in C, does not use RWX☆24Updated 10 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆25Updated last month
- Hooked create process injection for meterpreter☆23Updated 3 years ago
- Proxy function calls through the thread pool with ease☆23Updated last month
- Internal Monologue BOF☆13Updated 3 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆20Updated last year
- BOF for C2 framework☆40Updated 4 months ago
- A pure C version of SymProcAddress☆26Updated last year
- ☆25Updated 3 months ago
- Rust template/library for implementing your own COFF loader☆49Updated 2 months ago
- Rewrite to fit my needs☆27Updated 8 months ago
- Unix Process hollowing in rust☆21Updated 3 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆16Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆59Updated last year
- use python on windows with full submodule support without installation☆28Updated 2 months ago
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago
- ForsHops☆22Updated this week
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- ☆48Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Updated last year
- Bunch of BOF files☆30Updated 3 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆47Updated 6 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 6 months ago
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆23Updated 3 weeks ago
- ☆25Updated 2 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆70Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆17Updated last week