cocomelonc / offzone-2024-malware-persistence-workshopLinks
OFFZONE 2024 Malware Persistence workshop
☆20Updated 9 months ago
Alternatives and similar repositories for offzone-2024-malware-persistence-workshop
Users that are interested in offzone-2024-malware-persistence-workshop are comparing it to the libraries listed below
Sorting:
- BSides Prishtina 2024 Malware Development and Persistence workshop☆98Updated 4 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 9 months ago
- ☆108Updated 11 months ago
- ☆59Updated 5 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆122Updated last month
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆121Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆66Updated last year
- Payload Obfuscation for Red Teams workshop materials☆56Updated last week
- shell code example☆62Updated last week
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Malware?☆74Updated 11 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆104Updated 8 months ago
- "Service-less" driver loading☆161Updated 10 months ago
- A collection of PoCs to do common things in unconventional ways☆114Updated last month
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆124Updated this week
- CVE-2024-30090 - LPE PoC☆108Updated 11 months ago
- Activation Context Hijack☆169Updated 2 months ago
- ☆50Updated 6 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated last year
- Demoting PPL anti-malware services to less than a guest user☆62Updated 8 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆115Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆100Updated 7 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆50Updated 4 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆123Updated last month
- Section-based payload obfuscation technique for x64☆64Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆87Updated 2 years ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆45Updated 3 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆105Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 2 years ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆45Updated 8 months ago