coldpon / ring3-hidden
Hide processes, files, services in Windows ring3
☆24Updated 11 months ago
Alternatives and similar repositories for ring3-hidden
Users that are interested in ring3-hidden are comparing it to the libraries listed below
Sorting:
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 2 years ago
- Magical obfuscator, supports obfuscating EXE, BOF, and ShellCode.☆153Updated 5 months ago
- shellcode生成框架☆86Updated 10 months ago
- Kill Protected Process Light Process (include av)☆56Updated last year
- ☆30Updated last year
- Load static-compiled PE from remote server.☆61Updated 3 years ago
- An easy-to-use and powerful Macro for Stack Spoofing.☆20Updated 4 months ago
- 驱动加载器 -> 利用iqvw64e.sys映射驱动☆55Updated 4 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆55Updated 2 weeks ago
- windwos内核研究与驱动Code☆64Updated 3 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆70Updated 2 years ago
- demo抛砖引玉作为一个思路,此思路再魔改一下是可以连着主动防御整个关掉的,还在用,就不演示了☆9Updated 3 years ago
- IDA Python script for generating Windows x86 shellcode with one click☆37Updated last year
- An implementation of an indirect system call☆126Updated last year
- Windows API Call Obfuscation☆103Updated 2 years ago
- 无痕注入1☆75Updated 3 years ago
- A C Implementation for Bypassing Security Software☆26Updated last month
- https://key08.com/index.php/2021/10/19/1375.html☆67Updated 3 years ago
- A method to execute syscalls while bypassing EDR's function hooking and call stack analysis.☆13Updated 3 weeks ago
- Hook NtDeviceIoControlFile with PatchGuard☆105Updated 3 years ago
- Beacon compiled using clang☆67Updated 2 years ago
- 简单安排一下 autochk.sys 这个rootkit☆71Updated 2 years ago
- sc4cpp is a shellcode framework based on C++☆88Updated 3 years ago
- Proof of concept code for thread pool based process injection in Windows.☆116Updated last month
- about how to make a anti-virus engine☆62Updated 3 weeks ago
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆28Updated 5 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆32Updated 2 years ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆128Updated 2 years ago
- 内核级别隐藏指定窗口☆57Updated 3 years ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal console builder.☆52Updated 3 weeks ago