GhostWriting Injection Technique.
☆196Mar 26, 2018Updated 8 years ago
Alternatives and similar repositories for GhostWriting
Users that are interested in GhostWriting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A process injection technique using only thread context manipulation☆41Dec 18, 2023Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 3 years ago
- Finding Truth in the Shadows☆126Jan 26, 2023Updated 3 years ago
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆186Aug 2, 2023Updated 2 years ago
- Aims to identify sleeping beacons☆664Jan 25, 2026Updated 2 months ago
- In-memory hiding technique☆63Jan 5, 2025Updated last year
- Next gen process injection technique☆54Jul 9, 2020Updated 5 years ago
- Linux Sleep Obfuscation☆114Jan 7, 2024Updated 2 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆427Feb 11, 2024Updated 2 years ago
- ROP-based sleep obfuscation to evade memory scanners☆380Jun 22, 2025Updated 9 months ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆310Dec 9, 2023Updated 2 years ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆110Mar 25, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Threadless Process Injection through entry point hijacking☆352Sep 10, 2024Updated last year
- A collection of position independent coding resources☆109Nov 15, 2025Updated 4 months ago
- ☆44Oct 16, 2023Updated 2 years ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆409Sep 12, 2023Updated 2 years ago
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆360Sep 1, 2022Updated 3 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Jun 9, 2020Updated 5 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The Definitive Guide To Process Cloning on Windows☆543Jan 3, 2024Updated 2 years ago
- ☆108Aug 21, 2024Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆594Aug 2, 2025Updated 8 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆501Feb 3, 2022Updated 4 years ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆1,009Jun 4, 2024Updated last year
- Move CS beacon to GPU memory when sleeping☆251Nov 19, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PoC Implementation of a fully dynamic call stack spoofer☆938Jul 20, 2024Updated last year
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- A shellcode function to encrypt a running process image when sleeping.☆338Sep 11, 2021Updated 4 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆563Apr 8, 2025Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆192Mar 4, 2024Updated 2 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆66Aug 25, 2022Updated 3 years ago