deepinstinct / ShimMeLinks
☆146Updated 11 months ago
Alternatives and similar repositories for ShimMe
Users that are interested in ShimMe are comparing it to the libraries listed below
Sorting:
- ☆151Updated 2 years ago
- Create Anti-Copy DRM Malware☆65Updated last year
- ☆158Updated 9 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆87Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆146Updated last year
- Basic interactive Windows kernel offensive toolkit written in C☆131Updated 2 weeks ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆92Updated last year
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆131Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated 11 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆164Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆59Updated 4 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆89Updated 5 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated 2 years ago
- Shellcode loader☆94Updated 10 months ago
- Do some DLL SideLoading magic☆86Updated 2 years ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated last year
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated last year
- ☆112Updated 10 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- Bypass LSA protection using the BYODLL technique☆168Updated last year
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆112Updated last year
- ☆122Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆122Updated last month
- ☆78Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆110Updated 2 years ago
- ☆78Updated 8 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆100Updated 7 months ago