deepinstinct / ShimMeLinks
☆146Updated last year
Alternatives and similar repositories for ShimMe
Users that are interested in ShimMe are comparing it to the libraries listed below
Sorting:
- Create Anti-Copy DRM Malware☆70Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Updated last year
- ☆159Updated last year
- ☆151Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 2 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 7 months ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆135Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆88Updated 2 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆99Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated last year
- This repository implements Threadless Injection in C☆173Updated last year
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆163Updated 6 months ago
- ☆89Updated 2 years ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆84Updated 7 months ago
- Shellcode loader☆96Updated last year
- Basic interactive Windows kernel offensive toolkit written in C☆133Updated 2 months ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Updated last year
- Select any exported function in a dll as the new dll's entry point.☆81Updated last year
- ApexLdr is a DLL Payload Loader written in C☆113Updated last year
- TypeLib persistence technique☆138Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- Bypass LSA protection using the BYODLL technique☆170Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆90Updated 7 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆132Updated 3 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆83Updated last year
- ☆85Updated 10 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Updated 10 months ago
- Windows Persistence IT-Security☆108Updated 9 months ago