coremedic / IndirectProxyCall
Proof of concept demonstrating a method of proxying syscalls indirectly
☆8Updated 9 months ago
Alternatives and similar repositories for IndirectProxyCall:
Users that are interested in IndirectProxyCall are comparing it to the libraries listed below
- ☆103Updated 3 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆76Updated 2 months ago
- A collection of position independent coding resources☆77Updated 2 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 9 months ago
- A process injection technique using only thread context manipulation☆29Updated last year
- shell code example☆46Updated last week
- Malware?☆69Updated 6 months ago
- ☆29Updated 4 months ago
- Rust template/library for implementing your own COFF loader☆50Updated 3 months ago
- ForsHops☆41Updated last month
- Shellcode Loader Utilizing ETW Events☆63Updated 2 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆113Updated 4 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- converts sRDI compatible dlls to shellcode☆23Updated 3 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- ForsHops☆98Updated last month
- ☆99Updated last year
- ☆105Updated last month
- ☆57Updated 3 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆92Updated last year
- ☆32Updated 8 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆51Updated 3 months ago
- BOF with Synthetic Stackframe☆144Updated 2 months ago
- ☆86Updated 8 months ago
- ☆108Updated 3 months ago
- 🧠 The ultimate, community-curated resource for Beacon Object Files (BOFs) — tutorials, how-tos, deep dives, and reference materials.☆60Updated this week
- ☆61Updated 10 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆32Updated last month
- An i686 & x86_64 position independent implant template for Rust 🦀☆23Updated last month
- ☆120Updated last year