adamhlt / Process-Hollowing
Process Hollowing in C++ (x86 / x64) - Process PE image replacement
☆127Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Process-Hollowing
- Various Process Injection Techniques☆143Updated 2 years ago
- ☆225Updated 2 months ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆154Updated last year
- manual map unsigned driver over signed memory☆183Updated 7 months ago
- Simple Kernelmode DLL Injector with Manual mapping☆238Updated 11 months ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆224Updated 4 months ago
- Bypassing PatchGuard on modern x64 systems☆245Updated last year
- State of the art DLL injector that took 20 minutes to make☆207Updated last year
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆431Updated 2 years ago
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆148Updated 2 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆175Updated last year
- PoC Anti-Rootkit/Anti-Cheat Driver.☆160Updated 2 months ago
- load unsigned kernel-driver by patching dse in 248 lines☆109Updated 8 months ago
- simple Windows handle hijacker with a nod to Apxaey for inspiration☆201Updated last year
- Process Injection using Thread Name☆241Updated 2 months ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆434Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆152Updated last year
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆226Updated 2 years ago
- An easily modifiable shellcode template for Windows x64 written in C☆197Updated last year
- KDP compatible unsigned driver loader leveraging a write primitive in one of the IOCTLs of gdrv.sys☆132Updated 5 months ago
- Detects virtual machines and malware analysis environments☆115Updated 2 years ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆142Updated 4 months ago
- A mapper that maps shellcode into loaded large page drivers☆229Updated 2 years ago
- PoC capable of detecting manual syscalls from usermode.☆183Updated 3 years ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆164Updated 10 months ago
- Load your driver like win32k.sys☆246Updated 2 years ago
- user-mode Rootkit☆98Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆236Updated 7 months ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆156Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆178Updated 3 weeks ago