A process injection technique using only thread context manipulation
☆41Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for ghostwriting-2
Users that are interested in ghostwriting-2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- GhostWriting Injection Technique.☆196Mar 26, 2018Updated 7 years ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Jul 11, 2025Updated 8 months ago
- Nim process hollowing loader☆62Jul 22, 2025Updated 8 months ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆105Feb 25, 2025Updated last year
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- Sleep obfuscation☆271Dec 13, 2024Updated last year
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- ☆101Oct 7, 2023Updated 2 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆112Mar 25, 2024Updated last year
- ☆18Aug 8, 2024Updated last year
- Process Injection using Thread Name☆307Apr 18, 2025Updated 11 months ago
- Finding Truth in the Shadows☆125Jan 26, 2023Updated 3 years ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- Activation Context Hijack☆172Aug 3, 2025Updated 7 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 8 months ago
- find dll base addresses without PEB WALK☆162Jul 13, 2025Updated 8 months ago
- Host CLR and run .NET binaries using Rust☆153Dec 23, 2025Updated 3 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- ☆81Apr 23, 2024Updated last year
- ☆44Oct 16, 2023Updated 2 years ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆250Jun 11, 2024Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 4 months ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated last year
- Local & remote Windows DLL Proxying☆169Jun 17, 2024Updated last year
- Evasion by machine code de-optimization.☆418Jul 22, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- ☆32Jun 1, 2024Updated last year
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Asynchronous NFSv3 client in pure Python☆29Jul 16, 2025Updated 8 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆284Jun 15, 2024Updated last year
- ☆63May 31, 2024Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆117Aug 21, 2024Updated last year
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated 2 weeks ago