cocomelonc / hack-process-hacker2
Proof of Concept example for abusing Process Hacker 2 (v2.39.124)
☆19Updated 3 months ago
Alternatives and similar repositories for hack-process-hacker2:
Users that are interested in hack-process-hacker2 are comparing it to the libraries listed below
- Windows AppLocker Driver (appid.sys) LPE☆47Updated 6 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆41Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated last year
- API Hammering with C++20☆44Updated 2 years ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆21Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Persistence via Shell Extensions☆64Updated last year
- BYOVD collection☆21Updated 10 months ago
- ☆21Updated 9 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆38Updated 2 months ago
- ☆36Updated last year
- ☆27Updated 6 months ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 8 months ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆32Updated 3 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆31Updated last year
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆13Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆60Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆42Updated this week
- ☆49Updated 2 years ago
- Get your data from the resource section manually, with no need for windows apis☆56Updated 3 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆43Updated 11 months ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated last year
- A work in progress BOF/COFF loader in Rust☆46Updated last year
- Plantronics Desktop Hub LPE☆37Updated 8 months ago
- C# API for Nidhogg rootkit☆16Updated 9 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆45Updated 4 months ago
- In-memory hiding technique☆45Updated 3 weeks ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago