c3l3si4n / windows_sleep_techniques
A collections of methods to sleep on Windows using common and less-so-common techniques
β13Updated 3 months ago
Related projects β
Alternatives and complementary repositories for windows_sleep_techniques
- γπ§γRing 3 Rootkit for Windows 10β55Updated 8 months ago
- Section-based payload obfuscation technique for x64β58Updated 3 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.β92Updated last year
- Tool to start a python http server in a simple wayβ10Updated 2 years ago
- A process injection technique using only thread context manipulationβ23Updated 11 months ago
- This is a simple process injection made in C for Linux systemsβ22Updated last year
- a stage1 DLL loader with sleep obfuscationβ32Updated last year
- Splitting and executing shellcode across multiple pagesβ99Updated last year
- γβοΈγDetect which native Windows API's (NtAPI) are being hookedβ37Updated last year
- Create Anti-Copy DRM Malwareβ46Updated 3 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.β82Updated 5 months ago
- Malware?β70Updated last month
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.β57Updated 9 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.β55Updated 3 months ago
- β118Updated last year
- Windows Thread Pool Injection Havoc Implementationβ28Updated 7 months ago
- Enable or Disable TokenPrivilege(s)β12Updated 6 months ago
- β59Updated 5 months ago
- A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Callsβ104Updated 2 months ago
- β40Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.β14Updated last year
- Just another C2 Redirector using CloudFlare.β78Updated 6 months ago
- Red Team Operation's Defense Evasion Technique.β52Updated 5 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitorβ95Updated 7 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX sectionβ95Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loaderβ85Updated 8 months ago
- Classic Process Injection with Memory Evasion Techniques implemantationβ63Updated last year