dalvarezperez / CreateFile_based_rootkit
☆132Updated last year
Related projects ⓘ
Alternatives and complementary repositories for CreateFile_based_rootkit
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆156Updated 3 months ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆195Updated 4 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆187Updated 4 years ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆329Updated 3 years ago
- Example code for EDR bypassing☆146Updated 5 years ago
- Managed assembly shellcode generation☆263Updated 3 years ago
- Phantom DLL hollowing PoC☆350Updated 2 years ago
- Proxy system calls over an RPC channel☆96Updated 2 years ago
- Evasive Process Hollowing Techniques☆134Updated 4 years ago
- Just another Windows Process Injection☆389Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆261Updated 3 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆213Updated 4 years ago
- PoC for proxying COM objects when hijacking☆198Updated 5 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆239Updated 4 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆155Updated 5 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆341Updated 4 years ago
- Simple EDR implementation to demonstrate bypass☆159Updated 4 years ago
- Shellcoding utilities☆218Updated 3 years ago
- Kernel Exploits☆242Updated 3 years ago
- Windows System Programming Experiments☆216Updated 2 years ago
- a tool to make it easy and fast to test various forms of injection☆172Updated 5 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆217Updated last year
- Bring your own print driver privilege escalation tool☆244Updated 3 years ago
- Universal Unhooking☆316Updated 6 years ago
- Research on Anti-malware and other related security solutions☆256Updated 4 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆322Updated 4 years ago
- From directory deletion to SYSTEM shell☆110Updated 4 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆191Updated 5 years ago
- ☆147Updated 4 years ago