bopin2020 / WindowsCamp
Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&
☆56Updated 2 months ago
Alternatives and similar repositories for WindowsCamp:
Users that are interested in WindowsCamp are comparing it to the libraries listed below
- https://key08.com/index.php/2021/10/19/1375.html☆66Updated 2 years ago
- Kill Protected Process Light Process (include av)☆56Updated last year
- ☆30Updated last year
- ☆32Updated 4 years ago
- Windows Defender VDM lua collections☆47Updated 2 years ago
- 简单安排一下 autochk.sys 这个rootkit☆71Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago
- ☆40Updated 3 years ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆46Updated 3 years ago
- ☆17Updated 4 years ago
- Call NtCreateUserProcess directly as normal.☆68Updated 2 years ago
- Beacon compiled using clang☆63Updated 2 years ago
- IDA Python script for generating Windows x86 shellcode with one click☆37Updated last year
- An implementation of an indirect system call☆122Updated last year
- Hide Port In Windows☆38Updated 5 months ago
- about how to make a anti-virus engine☆45Updated this week
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- ksc4cpp is a shellcode framework for windows kernel based on C++☆22Updated 2 years ago
- shellcode生成框架☆84Updated 8 months ago
- My personal shellcode loader☆32Updated 2 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆59Updated 3 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆29Updated last year
- ☆22Updated 4 years ago
- Kernel file/process/object tool☆64Updated 3 years ago
- ☆37Updated 5 years ago
- Detect BypassUAC using AMSI☆22Updated last month
- bypass BeaconEye☆88Updated 3 years ago
- 从admin冲到TrustedInstaller☆17Updated 2 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆32Updated 2 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago