A process injection technique using only thread context manipulation
☆41Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for ghostwriting-2
Users that are interested in ghostwriting-2 are comparing it to the libraries listed below
Sorting:
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- GhostWriting Injection Technique.☆195Mar 26, 2018Updated 7 years ago
- string encryption in Nim☆20Jun 15, 2024Updated last year
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Jul 11, 2025Updated 7 months ago
- Nim process hollowing loader☆62Jul 22, 2025Updated 7 months ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆110Mar 25, 2024Updated last year
- Sleep obfuscation☆268Dec 13, 2024Updated last year
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated 11 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated last year
- Activation Context Hijack☆170Aug 3, 2025Updated 7 months ago
- ☆101Oct 7, 2023Updated 2 years ago
- Process Injection using Thread Name☆299Apr 18, 2025Updated 10 months ago
- ☆18Aug 8, 2024Updated last year
- ☆32Jun 1, 2024Updated last year
- ☆80Apr 23, 2024Updated last year
- find dll base addresses without PEB WALK☆160Jul 13, 2025Updated 7 months ago
- Host CLR and run .NET binaries using Rust☆151Dec 23, 2025Updated 2 months ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 7 months ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Aug 15, 2024Updated last year
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 11 months ago
- A nim implementation of sRDI☆20Oct 18, 2023Updated 2 years ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆283Jun 15, 2024Updated last year
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated last year
- Finding Truth in the Shadows☆123Jan 26, 2023Updated 3 years ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆117Aug 21, 2024Updated last year
- Evasion by machine code de-optimization.☆418Jul 22, 2024Updated last year
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆136Dec 20, 2022Updated 3 years ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆250Jun 11, 2024Updated last year
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆169Sep 12, 2024Updated last year
- ☆64May 31, 2024Updated last year
- Local & remote Windows DLL Proxying☆169Jun 17, 2024Updated last year