aaaddress1 / wowInjector
PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)
☆161Updated 3 years ago
Alternatives and similar repositories for wowInjector:
Users that are interested in wowInjector are comparing it to the libraries listed below
- Windows API Call Obfuscation☆99Updated 2 years ago
- Convert PE files to a shellcode☆74Updated 4 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆103Updated 3 years ago
- Kill Protected Process Light Process (include av)☆56Updated last year
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆216Updated 2 years ago
- A small PoC that creates processes in Windows☆176Updated 9 months ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- Windows PE Signature Thief in C++☆48Updated 4 years ago
- Shellcode to load an appended Dll☆88Updated 4 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆83Updated 2 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆78Updated 3 years ago
- ☆162Updated 3 years ago
- ☆191Updated 2 years ago
- PoC capable of detecting manual syscalls from usermode.☆192Updated 4 months ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Updated 4 years ago
- Load static-compiled PE from remote server.☆60Updated 3 years ago
- Silence EDRs by removing kernel callbacks☆229Updated 4 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆43Updated 7 years ago
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆27Updated 4 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆105Updated 4 years ago
- LdrLoadDll Unhooking☆129Updated 3 years ago
- ☆56Updated 2 years ago
- A simple program to obfuscate code written in cpp.☆48Updated 10 months ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆149Updated 4 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆59Updated 3 years ago
- Kernel file/process/object tool☆64Updated 3 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆56Updated 2 months ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆51Updated 3 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆109Updated 3 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 4 years ago