cod3nym / Ghosting-AMSILinks
Ghosting-AMSI
☆18Updated 6 months ago
Alternatives and similar repositories for Ghosting-AMSI
Users that are interested in Ghosting-AMSI are comparing it to the libraries listed below
Sorting:
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆51Updated last month
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- ☆80Updated last year
- ☆31Updated 11 months ago
- Linux Sleep Obfuscation☆105Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Updated 2 years ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated 10 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆129Updated 2 weeks ago
- ☆31Updated last year
- A bunch of shenanigans using functions, VEH and more☆37Updated 5 months ago
- Demoting PPL anti-malware services to less than a guest user☆64Updated 9 months ago
- ☆59Updated last year
- A synergized Visual Studio and Rust development environment☆19Updated 9 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆105Updated last year
- From C to binary shellcode converter.☆47Updated last week
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆76Updated 2 months ago
- Reports on Driver, LSASS and other security services mitigations☆31Updated 3 months ago
- ☆34Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆31Updated 7 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆52Updated 6 months ago
- A Proof-of-Concept implementation of Reflective DLL Injection (RDI) specifically for Windows on ARM64. Demonstrates PEB access via the x1…☆31Updated 5 months ago
- ☆38Updated 7 months ago
- ☆77Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆62Updated last year
- ☆38Updated 2 years ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 10 months ago
- ☆97Updated last year
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- macOS dylib stager☆36Updated 9 months ago