cjm00n / EvilSln
A New Exploitation Technique for Visual Studio Projects
☆445Updated last year
Related projects ⓘ
Alternatives and complementary repositories for EvilSln
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆478Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆494Updated 7 months ago
- Because AV evasion should be easy.☆314Updated 4 months ago
- shellcode loader for your evasion needs☆272Updated last week
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆454Updated 9 months ago
- LPE exploit for CVE-2023-21768☆482Updated last year
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆383Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆480Updated last year
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆300Updated 3 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆564Updated last month
- Protected Process Dumper Tool☆520Updated last year
- Performing Indirect Clean Syscalls☆483Updated last year
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆346Updated last year
- ☆245Updated 10 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆244Updated 5 months ago
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆294Updated 4 months ago
- Command and Control Framework written in C#☆377Updated last year
- CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code☆320Updated 4 months ago
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆423Updated 2 weeks ago
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆405Updated last year
- PoCs for Kernelmode rootkit techniques research.☆334Updated last week
- Analyse your malware to surgically obfuscate it☆419Updated last year
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆383Updated last year
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆353Updated last month
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆371Updated 3 months ago
- A Highly capable Pe Packer☆684Updated 2 years ago
- Complete list of LPE exploits for Windows (starting from 2023)☆395Updated last week
- Dump lsass using only Native APIs by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆467Updated last month
- Bypassing UAC with SSPI Datagram Contexts☆414Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆408Updated 9 months ago