GhostWriting Injection Technique.
☆197Mar 26, 2018Updated 8 years ago
Alternatives and similar repositories for GhostWriting
Users that are interested in GhostWriting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A process injection technique using only thread context manipulation☆41Dec 18, 2023Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆284Sep 18, 2024Updated last year
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 3 years ago
- Finding Truth in the Shadows☆127Jan 26, 2023Updated 3 years ago
- Sample Rust Hooking Engine☆34Apr 5, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆187Aug 2, 2023Updated 2 years ago
- Aims to identify sleeping beacons☆667Jan 25, 2026Updated 3 months ago
- In-memory hiding technique☆64Jan 5, 2025Updated last year
- Next gen process injection technique☆55Jul 9, 2020Updated 5 years ago
- Linux Sleep Obfuscation☆115Jan 7, 2024Updated 2 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆432Feb 11, 2024Updated 2 years ago
- ROP-based sleep obfuscation to evade memory scanners☆381Jun 22, 2025Updated 10 months ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆313Dec 9, 2023Updated 2 years ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆111Mar 25, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Threadless Process Injection through entry point hijacking☆353Sep 10, 2024Updated last year
- ☆45Oct 16, 2023Updated 2 years ago
- A collection of position independent coding resources☆113Nov 15, 2025Updated 5 months ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆410Sep 12, 2023Updated 2 years ago
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆360Sep 1, 2022Updated 3 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Jun 9, 2020Updated 5 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated 2 years ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The Definitive Guide To Process Cloning on Windows☆545Jan 3, 2024Updated 2 years ago
- ☆108Aug 21, 2024Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆595Aug 2, 2025Updated 9 months ago
- PoC Implementation of a fully dynamic call stack spoofer☆949Jul 20, 2024Updated last year
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆503Feb 3, 2022Updated 4 years ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆1,014Jun 4, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Move CS beacon to GPU memory when sleeping☆251Nov 19, 2021Updated 4 years ago
- Heap encryption in Nim☆21Aug 25, 2024Updated last year
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- A shellcode function to encrypt a running process image when sleeping.☆338Sep 11, 2021Updated 4 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆566Apr 8, 2025Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆192Mar 4, 2024Updated 2 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆68Aug 25, 2022Updated 3 years ago