fin3ss3g0d / HookFinder
Simple PoC to locate hooked functions by EDR in ntdll.dll
☆36Updated last year
Alternatives and similar repositories for HookFinder:
Users that are interested in HookFinder are comparing it to the libraries listed below
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆43Updated last year
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 10 months ago
- Artemis - C++ Hell's Gate Syscall Implementation☆32Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- ☆36Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆70Updated last year
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆46Updated last year
- Get your data from the resource section manually, with no need for windows apis☆58Updated 4 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆22Updated last year
- API Hammering with C++20☆45Updated 2 years ago
- Persistence via Shell Extensions☆64Updated last year
- ☆52Updated last month
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated 11 months ago
- A work in progress BOF/COFF loader in Rust☆47Updated last year
- ☆45Updated last year
- ☆37Updated 3 weeks ago
- Exploiting the KsecDD Windows driver through Server Silos☆50Updated 4 months ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated last year
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆21Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆62Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆15Updated 2 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆33Updated 3 years ago
- Core Submodule of Exploration C2☆15Updated last week
- Beacon Debugger☆40Updated 4 months ago
- BYOVD collection☆23Updated 11 months ago
- Threadless injection via TLS callbacks☆16Updated 3 months ago