c3l3si4n / windows_sleep_techniques
A collections of methods to sleep on Windows using common and less-so-common techniques
β14Updated 8 months ago
Alternatives and similar repositories for windows_sleep_techniques:
Users that are interested in windows_sleep_techniques are comparing it to the libraries listed below
- Splitting and executing shellcode across multiple pagesβ100Updated last year
- γπ§γRing 3 Rootkit for Windows 10β57Updated 4 months ago
- abusing Process Hacker driver to terminate other processes (BYOVD)β82Updated last year
- This is a simple process injection made in C for Linux systemsβ26Updated last year
- Find DLLs with RWX sectionβ79Updated last year
- Malware?β69Updated 6 months ago
- β36Updated 2 years ago
- Create Anti-Copy DRM Malwareβ55Updated 8 months ago
- Windows Kernel Offensive Toolsetβ120Updated 7 months ago
- γβοΈγDetect which native Windows API's (NtAPI) are being hookedβ38Updated 4 months ago
- β47Updated 2 years ago
- Section-based payload obfuscation technique for x64β59Updated 8 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.β89Updated 10 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.β72Updated last year
- Sleep Obfuscationβ45Updated 2 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.β102Updated last year
- β42Updated 2 years ago
- A bunch of scripts and code i wrote.β139Updated 5 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframeβ114Updated 2 months ago
- Shellcode Loader Utilizing ETW Eventsβ63Updated last month
- API Hammering with C++20β46Updated 2 years ago
- Tool to start a python http server in a simple wayβ10Updated 3 years ago
- A process injection technique using only thread context manipulationβ28Updated last year
- Rewrite to fit my needsβ27Updated 9 months ago
- Reimplementation of the KExecDD DSE bypass technique.β47Updated 7 months ago
- β86Updated 8 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.β37Updated last week
- Classic Process Injection with Memory Evasion Techniques implemantationβ69Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.β74Updated 8 months ago
- A collection of position independent coding resourcesβ76Updated 2 months ago