ZeroMemoryEx / Bypass-Sandbox-EvasionLinks
Bypass Malware Sandbox Evasion Ram check
☆140Updated 2 years ago
Alternatives and similar repositories for Bypass-Sandbox-Evasion
Users that are interested in Bypass-Sandbox-Evasion are comparing it to the libraries listed below
Sorting:
- PE obfuscator with Evasion in mind☆213Updated 2 years ago
- Create Anti-Copy DRM Malware☆68Updated last year
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆109Updated 2 years ago
- random code snippets, useful for getting started☆121Updated last year
- Execute shellcode files with rundll32☆210Updated last year
- ☆107Updated 2 years ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆229Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆133Updated last month
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆198Updated last year
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated 2 years ago
- ☆122Updated 7 months ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆278Updated 8 months ago
- ☆163Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- Kernel Mode Driver for Elevating Process Privileges☆134Updated 2 years ago
- ☆88Updated 2 years ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆181Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆291Updated 2 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆180Updated 2 years ago
- Weaponized HellsGate/SigFlip☆205Updated 2 years ago
- This repository implements Threadless Injection in C☆171Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆197Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 11 months ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆179Updated 3 years ago
- ☆161Updated 2 years ago
- ☆245Updated 2 years ago
- POC for frustrating/defeating Malware Analysts☆157Updated 3 years ago