dalvarezperez / CreateFile_based_rootkit
☆131Updated last year
Alternatives and similar repositories for CreateFile_based_rootkit:
Users that are interested in CreateFile_based_rootkit are comparing it to the libraries listed below
- NINA: No Injection, No Allocation x64 Process Injection Technique☆195Updated 4 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆187Updated 4 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆160Updated 2 months ago
- Universal Unhooking☆318Updated 6 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- Phantom DLL hollowing PoC☆355Updated 2 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆156Updated 5 years ago
- Example code for EDR bypassing☆150Updated 5 years ago
- Evasive Process Hollowing Techniques☆136Updated 4 years ago
- PoC for proxying COM objects when hijacking☆203Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆214Updated 4 years ago
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆118Updated 5 years ago
- Managed assembly shellcode generation☆266Updated 3 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆243Updated 4 years ago
- ☆147Updated 4 years ago
- Process reimaging proof of concept code☆95Updated 5 years ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆329Updated 3 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆138Updated 2 years ago
- a tool to make it easy and fast to test various forms of injection☆172Updated 5 years ago
- Shellcoding utilities☆221Updated 4 years ago
- Neutering Sysmon via driver unload☆225Updated 2 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆180Updated 3 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆137Updated 4 years ago
- A more stealthy variant of "DLL hollowing"☆335Updated 11 months ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆193Updated 5 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆343Updated 4 years ago
- Just another Windows Process Injection☆390Updated 4 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆163Updated 3 years ago
- Project to check which Nt/Zw functions your local EDR is hooking☆182Updated 3 years ago
- Shellcode injector using direct syscalls☆119Updated 4 years ago