GhostWriting Injection Technique.
☆200Mar 26, 2018Updated 8 years ago
Alternatives and similar repositories for GhostWriting
Users that are interested in GhostWriting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A process injection technique using only thread context manipulation☆42Dec 18, 2023Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆286Sep 18, 2024Updated last year
- A simple Linux in-memory .so loader☆34Mar 29, 2023Updated 3 years ago
- Finding Truth in the Shadows☆129Jan 26, 2023Updated 3 years ago
- Sample Rust Hooking Engine☆34Apr 5, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆187Aug 2, 2023Updated 2 years ago
- Aims to identify sleeping beacons☆669Jan 25, 2026Updated 3 months ago
- In-memory hiding technique☆64Jan 5, 2025Updated last year
- Next gen process injection technique☆55Jul 9, 2020Updated 5 years ago
- Linux Sleep Obfuscation☆117Jan 7, 2024Updated 2 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆434Feb 11, 2024Updated 2 years ago
- ROP-based sleep obfuscation to evade memory scanners☆381Jun 22, 2025Updated 11 months ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆311Dec 9, 2023Updated 2 years ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆111Mar 25, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Threadless Process Injection through entry point hijacking☆353Sep 10, 2024Updated last year
- ☆45Oct 16, 2023Updated 2 years ago
- A collection of position independent coding resources☆114Nov 15, 2025Updated 6 months ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆415Sep 12, 2023Updated 2 years ago
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆360Sep 1, 2022Updated 3 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆226Jun 9, 2020Updated 5 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆35Apr 26, 2024Updated 2 years ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The Definitive Guide To Process Cloning on Windows☆550Jan 3, 2024Updated 2 years ago
- ☆109Aug 21, 2024Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆602Aug 2, 2025Updated 9 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆956Jul 20, 2024Updated last year
- Indirect syscalls + DInvoke made simple.☆97Dec 24, 2024Updated last year
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆505Feb 3, 2022Updated 4 years ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆1,016Jun 4, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Move CS beacon to GPU memory when sleeping☆252Nov 19, 2021Updated 4 years ago
- Heap encryption in Nim☆21Aug 25, 2024Updated last year
- Beacon Object File Loader☆294Dec 3, 2023Updated 2 years ago
- A shellcode function to encrypt a running process image when sleeping.☆340Sep 11, 2021Updated 4 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆193Mar 4, 2024Updated 2 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆572Apr 8, 2025Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆69Aug 25, 2022Updated 3 years ago