deepinstinct / ShimMeLinks
☆147Updated last year
Alternatives and similar repositories for ShimMe
Users that are interested in ShimMe are comparing it to the libraries listed below
Sorting:
- Create Anti-Copy DRM Malware☆71Updated last year
- ☆151Updated 2 years ago
- ☆159Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 9 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆85Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Updated last year
- Basic interactive Windows kernel offensive toolkit written in C☆135Updated 4 months ago
- ☆108Updated last year
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆136Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆84Updated last year
- ☆86Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 8 months ago
- Template-based generation of shellcode loaders☆79Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Updated 2 years ago
- Shellcode loader☆100Updated last year
- I have documented all of the AMSI patches that I learned till now☆75Updated 2 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated 2 years ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆166Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Updated 11 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆84Updated 9 months ago
- Bypass LSA protection using the BYODLL technique☆170Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- ☆122Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- ☆126Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆101Updated last year
- ☆89Updated 2 years ago