deepinstinct / ShimMeLinks
☆147Updated last year
Alternatives and similar repositories for ShimMe
Users that are interested in ShimMe are comparing it to the libraries listed below
Sorting:
- Create Anti-Copy DRM Malware☆71Updated last year
- ☆159Updated last year
- ☆151Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆135Updated 4 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆101Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- ☆108Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆85Updated 2 years ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆167Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 8 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆85Updated 9 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆84Updated last year
- Template-based generation of shellcode loaders☆80Updated last year
- Shellcode loader☆100Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆136Updated 5 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Updated 2 years ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆91Updated 9 months ago
- ☆64Updated last year
- ☆122Updated 2 years ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Updated 11 months ago
- Bypass LSA protection using the BYODLL technique☆170Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆136Updated last year
- Impersonate Tokens using only NTAPI functions☆83Updated 10 months ago
- ☆86Updated last year
- Linker for Beacon Object Files☆147Updated this week
- Do some DLL SideLoading magic☆89Updated 2 years ago