cod3nym / Ghosting-AMSILinks
Ghosting-AMSI
☆18Updated 7 months ago
Alternatives and similar repositories for Ghosting-AMSI
Users that are interested in Ghosting-AMSI are comparing it to the libraries listed below
Sorting:
- Linux Sleep Obfuscation☆106Updated last year
- Demoting PPL anti-malware services to less than a guest user☆64Updated 10 months ago
- ☆32Updated last year
- ☆80Updated last year
- From C to binary shellcode converter.☆48Updated last month
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆52Updated 2 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Updated 2 years ago
- ☆31Updated last year
- ☆38Updated 2 years ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆26Updated last year
- Commandline spoofing on Windows☆74Updated 2 weeks ago
- ☆59Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 6 months ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆39Updated 9 months ago
- various methods of making API calls☆19Updated 10 months ago
- Blog/Journal on how to backdoor VSCode extensions☆75Updated 4 months ago
- macOS dylib stager☆36Updated 10 months ago
- ☆62Updated last year
- BYOVD collection☆24Updated last year
- A synergized Visual Studio and Rust development environment☆19Updated 10 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆76Updated 3 years ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated 10 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- ☆61Updated last year
- Things i do because i saw it on twitter on a weekend☆57Updated 4 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆45Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year