comosedice2012 / Introduction-to-Process-HollowingLinks
☆19Updated 4 years ago
Alternatives and similar repositories for Introduction-to-Process-Hollowing
Users that are interested in Introduction-to-Process-Hollowing are comparing it to the libraries listed below
Sorting:
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆96Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 4 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆53Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆56Updated last year
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆92Updated 3 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Updated 3 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Updated 4 years ago
- PoC XLL builder in Python/Nim☆49Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Updated 3 years ago
- ☆10Updated 2 years ago
- ☆33Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- Nim process hollowing loader☆62Updated 6 months ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆88Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- D/Invoke implementation in Nim☆103Updated 3 years ago
- ☆61Updated 2 years ago
- ☆78Updated 3 years ago
- A Bumblebee-inspired Crypter☆80Updated 3 years ago
- POC for frustrating/defeating Malware Analysts☆158Updated 3 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Updated 2 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53Updated 5 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 3 years ago