brosck / APIHookingDetector
「⚙️」Detect which native Windows API's (NtAPI) are being hooked
☆38Updated 3 months ago
Alternatives and similar repositories for APIHookingDetector:
Users that are interested in APIHookingDetector are comparing it to the libraries listed below
- Rewrite to fit my needs☆27Updated 7 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆19Updated last year
- in-process powershell runner for BRC4☆44Updated last year
- ☆47Updated 2 years ago
- ☆47Updated last year
- ☆58Updated last year
- Run Cobalt Strike BOFs in Brute Ratel C4!☆62Updated 2 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 6 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- A care package of useful bofs for red team engagments☆54Updated 3 months ago
- ☆53Updated 4 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆42Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆47Updated last year
- A pure C version of SymProcAddress☆25Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- Detect userland hooks placed by AV/EDR☆27Updated last year
- API Hammering with C++20☆45Updated 2 years ago
- Sniffing files generator☆55Updated 3 weeks ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆62Updated 2 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- malleable profile generator GUI for Havoc☆56Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago