deepinstinct / ShimMeLinks
☆145Updated last year
Alternatives and similar repositories for ShimMe
Users that are interested in ShimMe are comparing it to the libraries listed below
Sorting:
- Create Anti-Copy DRM Malware☆70Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆99Updated last year
- ☆159Updated 11 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆88Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆83Updated 7 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆166Updated last year
- ☆151Updated 2 years ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆131Updated 3 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Updated last year
- Basic interactive Windows kernel offensive toolkit written in C☆133Updated 2 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆60Updated 6 months ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆135Updated last year
- Shellcode loader☆96Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Updated 10 months ago
- Template-based generation of shellcode loaders☆79Updated last year
- Code execution/injection technique using DLL PEB module structure manipulation☆215Updated 6 months ago
- ☆122Updated 2 years ago
- Bypass LSA protection using the BYODLL technique☆170Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- TypeLib persistence technique☆136Updated last year
- Sleep obfuscation☆251Updated 11 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆103Updated 9 months ago
- ApexLdr is a DLL Payload Loader written in C☆113Updated last year
- ☆62Updated last year
- Injecting DLL into LSASS at boot☆150Updated 7 months ago