cod3nym / Ghosting-AMSILinks
Ghosting-AMSI
☆17Updated 4 months ago
Alternatives and similar repositories for Ghosting-AMSI
Users that are interested in Ghosting-AMSI are comparing it to the libraries listed below
Sorting:
- ☆29Updated last year
- Folder Or File Delete to Get System Shell on Current Session Desktop☆45Updated 8 months ago
- ☆80Updated last year
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆27Updated 5 months ago
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆40Updated 2 years ago
- Linux Sleep Obfuscation☆105Updated last year
- A synergized Visual Studio and Rust development environment☆19Updated 7 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- ☆76Updated last year
- A work in progress BOF/COFF loader in Rust☆51Updated 2 years ago
- ☆31Updated 9 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆105Updated last year
- various methods of making API calls☆19Updated 7 months ago
- Unpacker for donut shellcode☆17Updated 5 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated last year
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆90Updated 3 weeks ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- ☆37Updated 2 years ago
- A bunch of shenanigans using functions, VEH and more☆34Updated 3 months ago
- Select any exported function in a dll as the new dll's entry point.☆82Updated 10 months ago
- Reports on Driver, LSASS and other security services mitigations☆31Updated 3 weeks ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆50Updated 4 months ago
- ☆74Updated 2 years ago
- use python on windows with full submodule support without installation☆30Updated 7 months ago
- An example of COM hijacking using a proxy DLL.☆40Updated 4 years ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆61Updated last year
- ☆47Updated 2 years ago
- ☆36Updated 5 months ago