c3l3si4n / windows_sleep_techniquesLinks
A collections of methods to sleep on Windows using common and less-so-common techniques
☆14Updated 10 months ago
Alternatives and similar repositories for windows_sleep_techniques
Users that are interested in windows_sleep_techniques are comparing it to the libraries listed below
Sorting:
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 6 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 6 months ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆25Updated 2 months ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- Section-based payload obfuscation technique for x64☆61Updated 10 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆103Updated last year
- Find DLLs with RWX section☆81Updated last year
- Shellcode Loader Utilizing ETW Events☆63Updated 4 months ago
- ☆86Updated 10 months ago
- A process injection technique using only thread context manipulation☆38Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- ☆37Updated 2 years ago
- Create Anti-Copy DRM Malware☆58Updated 10 months ago
- A collection of position independent coding resources☆79Updated 4 months ago
- in-process powershell runner for BRC4☆45Updated last year
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- kernel-mode DLL Injector☆85Updated 2 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 10 months ago
- PoC arbitrary WPM without a process handle☆19Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 8 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆36Updated 6 months ago
- ☆55Updated 8 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- ☆61Updated last year
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- shell code example☆49Updated last month
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆105Updated last year
- using the gpu to hide your payload☆59Updated 2 years ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 10 months ago