crummie5 / Freshycalls_PoC
A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯
☆40Updated 4 years ago
Alternatives and similar repositories for Freshycalls_PoC:
Users that are interested in Freshycalls_PoC are comparing it to the libraries listed below
- ☆50Updated 4 years ago
- ☆14Updated 2 years ago
- ☆59Updated 3 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- ☆38Updated 3 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆33Updated 4 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 3 years ago
- ☆43Updated last year
- all credits go to @mgeeky☆64Updated 3 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆28Updated 3 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆47Updated 4 years ago
- A simple COM server which provides a component to run shellcode☆133Updated 4 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- ☆82Updated 3 years ago
- Files for http://deniable.org/windows/windows-callbacks☆24Updated 4 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆14Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆76Updated 2 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆55Updated 8 months ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆53Updated 2 years ago
- ☆36Updated 4 years ago
- aggressor and pycobalt scripts.☆18Updated 4 years ago
- A PoC tool for exploiting leaked process and thread handles☆30Updated last year
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆85Updated 3 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆27Updated 3 years ago
- A work in progress BOF/COFF loader in Rust☆47Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆70Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 2 years ago
- Injects shellcode into remote processes using direct syscalls☆75Updated 4 years ago