brosck / APIHookingDetectorLinks
「⚙️」Detect which native Windows API's (NtAPI) are being hooked
☆38Updated 11 months ago
Alternatives and similar repositories for APIHookingDetector
Users that are interested in APIHookingDetector are comparing it to the libraries listed below
Sorting:
- ☆61Updated last year
- ☆59Updated last year
- ☆47Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated 2 years ago
- ☆38Updated 8 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Sniffing files generator☆59Updated 9 months ago
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- Proxy function calls through the thread pool with ease☆31Updated 9 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- API Hammering with C++20☆49Updated 3 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆43Updated last year
- in-process powershell runner for BRC4☆48Updated 2 years ago
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Updated 2 years ago
- EvtPsst☆55Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Things i do because i saw it on twitter on a weekend☆57Updated 4 months ago
- Rewrite to fit my needs☆32Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 10 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆45Updated last year
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆28Updated 6 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- maldev obviously☆28Updated 7 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆27Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- A care package of useful bofs for red team engagments☆55Updated 11 months ago
- miscellaneous codes☆36Updated 2 years ago