boku7 / x64win-DynamicNoNull-WinExec-PopCalc-Shellcode
64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free
☆62Updated 2 years ago
Alternatives and similar repositories for x64win-DynamicNoNull-WinExec-PopCalc-Shellcode
Users that are interested in x64win-DynamicNoNull-WinExec-PopCalc-Shellcode are comparing it to the libraries listed below
Sorting:
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆100Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- ☆115Updated 2 years ago
- Enabled / Disable LSA Protection via BYOVD☆68Updated 3 years ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆56Updated 2 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆125Updated 3 years ago
- ☆165Updated 3 years ago
- Next gen process injection technique☆52Updated 4 years ago
- ☆111Updated 2 years ago
- Minifilter Callback Patching Proof-of-Concept☆71Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆101Updated 2 years ago
- ☆96Updated 3 years ago
- ☆62Updated 3 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆127Updated 2 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆135Updated 2 years ago
- ☆111Updated 2 years ago
- ☆49Updated 2 years ago
- Get your data from the resource section manually, with no need for windows apis☆62Updated 6 months ago
- ☆99Updated last year
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 3 years ago
- Piece of code to detect and remove hooks in IAT☆63Updated 2 years ago
- ☆140Updated 2 years ago
- ☆82Updated 8 months ago
- ☆82Updated 3 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆137Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆72Updated last month
- It's pointy and it hurts!☆125Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago