c3l3si4n / windows_sleep_techniquesLinks
A collections of methods to sleep on Windows using common and less-so-common techniques
☆14Updated 9 months ago
Alternatives and similar repositories for windows_sleep_techniques
Users that are interested in windows_sleep_techniques are comparing it to the libraries listed below
Sorting:
- 「🧊」Ring 3 Rootkit for Windows 10☆58Updated 6 months ago
- Splitting and executing shellcode across multiple pages☆103Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆103Updated last year
- This is a simple process injection made in C for Linux systems☆26Updated last year
- Create Anti-Copy DRM Malware☆57Updated 9 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆35Updated 6 months ago
- ☆36Updated 2 years ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆24Updated last month
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 6 months ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆82Updated 2 years ago
- Malware?☆70Updated 7 months ago
- Red Team Operation's Defense Evasion Technique.☆52Updated last year
- Windows Kernel Offensive Toolset☆124Updated 8 months ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- API Hammering with C++20☆46Updated 2 years ago
- ☆49Updated 2 years ago
- kernel-mode DLL Injector☆82Updated last month
- in-process powershell runner for BRC4☆45Updated last year
- ☆85Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- A bunch of scripts and code i wrote.☆141Updated 7 months ago
- ☆151Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆178Updated last year
- Attacking the cleanup_module function of a kernel module☆36Updated 2 months ago
- Section-based payload obfuscation technique for x64☆59Updated 9 months ago
- Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Library☆31Updated 2 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆89Updated 11 months ago
- Find DLLs with RWX section☆81Updated last year