GhostWriting Injection Technique.
☆195Mar 26, 2018Updated 7 years ago
Alternatives and similar repositories for GhostWriting
Users that are interested in GhostWriting are comparing it to the libraries listed below
Sorting:
- A process injection technique using only thread context manipulation☆41Dec 18, 2023Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- Finding Truth in the Shadows☆123Jan 26, 2023Updated 3 years ago
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated last year
- Linux Sleep Obfuscation☆112Jan 7, 2024Updated 2 years ago
- Aims to identify sleeping beacons☆662Jan 25, 2026Updated last month
- ROP-based sleep obfuscation to evade memory scanners☆376Jun 22, 2025Updated 8 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆185Aug 2, 2023Updated 2 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆427Feb 11, 2024Updated 2 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆307Dec 9, 2023Updated 2 years ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- Threadless Process Injection through entry point hijacking☆350Sep 10, 2024Updated last year
- Move CS beacon to GPU memory when sleeping☆251Nov 19, 2021Updated 4 years ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆110Mar 25, 2024Updated last year
- In-memory hiding technique☆63Jan 5, 2025Updated last year
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆407Sep 12, 2023Updated 2 years ago
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆358Sep 1, 2022Updated 3 years ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆590Aug 2, 2025Updated 7 months ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- The Definitive Guide To Process Cloning on Windows☆543Jan 3, 2024Updated 2 years ago
- A small NtCreateUserProcess PoC that spawns a Command prompt.☆102Aug 25, 2022Updated 3 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Jun 9, 2020Updated 5 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,006Jun 4, 2024Updated last year
- Tools for analyzing EDR agents☆277Jun 10, 2024Updated last year
- A shellcode function to encrypt a running process image when sleeping.☆340Sep 11, 2021Updated 4 years ago
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆499Feb 3, 2022Updated 4 years ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆539Feb 13, 2024Updated 2 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆917Jul 20, 2024Updated last year
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆190Mar 4, 2024Updated last year
- PoC for thread pool based process injection in Windows.☆122Mar 29, 2025Updated 11 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆298Jul 31, 2024Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆323Jan 17, 2024Updated 2 years ago