cocomelonc / offzone-2024-malware-persistence-workshopLinks
OFFZONE 2024 Malware Persistence workshop
☆19Updated 9 months ago
Alternatives and similar repositories for offzone-2024-malware-persistence-workshop
Users that are interested in offzone-2024-malware-persistence-workshop are comparing it to the libraries listed below
Sorting:
- BSides Prishtina 2024 Malware Development and Persistence workshop☆97Updated 3 months ago
- Windows AppLocker Driver (appid.sys) LPE☆65Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated 11 months ago
- ☆108Updated 2 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆122Updated this week
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- Unhook Ntdll.dll, Go & C++.☆28Updated 4 months ago
- Nim process hollowing loader☆59Updated last month
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆81Updated 4 months ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆60Updated 4 months ago
- A collection of PoCs to do common things in unconventional ways☆107Updated 2 weeks ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆146Updated 10 months ago
- Red Team Operation's Defense Evasion Technique.☆55Updated last year
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆55Updated 2 weeks ago
- Demoting PPL anti-malware services to less than a guest user☆63Updated 7 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 7 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆68Updated 3 months ago
- ☆59Updated 4 months ago
- ☆37Updated last year
- Malware?☆74Updated 11 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 8 months ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆45Updated 3 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.☆116Updated 3 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆47Updated 2 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆119Updated last year