a7t0fwa7 / SymProcSleuthLinks
A pure C version of SymProcAddress
☆29Updated last year
Alternatives and similar repositories for SymProcSleuth
Users that are interested in SymProcSleuth are comparing it to the libraries listed below
Sorting:
- ☆59Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated last year
- ☆47Updated 2 years ago
- EvtPsst☆55Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆63Updated last year
- miscellaneous codes☆35Updated last year
- in-process powershell runner for BRC4☆46Updated last year
- BOF for C2 framework☆42Updated 9 months ago
- ☆36Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Proxy function calls through the thread pool with ease☆28Updated 5 months ago
- ☆57Updated 10 months ago
- ☆34Updated 4 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆27Updated last month
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 6 months ago
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- string/file/shellcode encryptor using AES/XOR☆11Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆38Updated last month
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- Sniffing files generator☆59Updated 6 months ago
- Misery Loader to bypass modern EDR solutions☆15Updated 8 months ago
- ☆23Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆76Updated last year
- ☆48Updated 2 years ago
- Detect userland hooks placed by AV/EDR☆28Updated last year
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 5 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated last year