etwhook / TartarusInjector
Native Shellcode Injector Via Handle Hijacking & Pool Party.
☆12Updated 11 months ago
Alternatives and similar repositories for TartarusInjector:
Users that are interested in TartarusInjector are comparing it to the libraries listed below
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated 10 months ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆41Updated 6 months ago
- minimal msvc-windows exclusive lazy importer for C++☆33Updated 3 years ago
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆45Updated last month
- kernel to user mode APC injector☆44Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function calls☆35Updated last year
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆26Updated last year
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- codecave hook reverse engineering toolkit.☆37Updated last year
- spoof return address☆73Updated last year
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆16Updated 8 months ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated 2 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- silence file system monitoring components by hooking their minifilters☆56Updated last year
- ☆44Updated last month
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- ☆37Updated last month
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 9 months ago
- Header only library for obfuscation import winapi functions.☆40Updated last month
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 7 months ago
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆32Updated 5 months ago
- Scan for potentially vulnerable drivers☆86Updated 3 years ago
- proof of concept of user-mode anti-breakpoint technique☆15Updated last year
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- Next gen process injection technique☆45Updated 4 years ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 3 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 9 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆47Updated 6 months ago
- Compileable POC of namazso's x64 return address spoofer.☆51Updated 4 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆13Updated 3 years ago