aaaddress1 / dnLauncher
☆36Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for dnLauncher
- A small commented POC for removing API hooks placed by AV/EDR.☆33Updated 4 years ago
- ☆58Updated 2 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆44Updated 7 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆39Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- ☆15Updated 3 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- ☆31Updated 4 years ago
- A simple COM server which provides a component to run shellcode☆132Updated 4 years ago
- ☆49Updated 4 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- SharpASM is a C# project that aims to automate ASM (i.e. shellcode) execution in .NET programs by exploiting code caves in RWX sections a…☆57Updated 2 years ago
- ☆79Updated 2 years ago
- ☆67Updated last year
- ☆24Updated 3 years ago
- A ready-made template for a project based on libpeconv.☆41Updated last month
- ☆76Updated 2 months ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆39Updated 5 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- Sysmon shenanigans☆65Updated 4 years ago
- ☆37Updated 3 years ago
- C++ function that will automagically unhook a specified Windows API☆60Updated 4 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆92Updated 5 years ago