cocomelonc / offzone-2024-malware-persistence-workshopLinks
OFFZONE 2024 Malware Persistence workshop
☆21Updated 11 months ago
Alternatives and similar repositories for offzone-2024-malware-persistence-workshop
Users that are interested in offzone-2024-malware-persistence-workshop are comparing it to the libraries listed below
Sorting:
- BSides Prishtina 2024 Malware Development and Persistence workshop☆117Updated 6 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆134Updated this week
- Windows AppLocker Driver (appid.sys) LPE☆69Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 11 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆132Updated 3 months ago
- ☆108Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated last year
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆61Updated 7 months ago
- Create Anti-Copy DRM Malware☆70Updated last year
- A collection of PoCs to do common things in unconventional ways☆118Updated 3 months ago
- "Service-less" driver loading☆165Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 8 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆151Updated 2 weeks ago
- Demoting PPL anti-malware services to less than a guest user☆64Updated 10 months ago
- ☆61Updated 7 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 6 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- ☆51Updated 8 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆73Updated 5 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 2 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- POC of GITHUB simple C2 in rust☆52Updated 4 months ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆24Updated last year
- shell code example☆63Updated last month
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆48Updated 5 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆102Updated 9 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆135Updated 3 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 5 months ago
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆129Updated last week