florylsk / AmsiBypass123
☆13Updated last year
Alternatives and similar repositories for AmsiBypass123:
Users that are interested in AmsiBypass123 are comparing it to the libraries listed below
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆32Updated 3 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆31Updated last year
- Threadless injection via TLS callbacks☆16Updated 2 months ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆15Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆41Updated last year
- ☆36Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- ☆42Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆42Updated last year
- ☆15Updated 3 years ago
- A way to extract tickets in case I need to purge and restore tickets on the fly.☆17Updated 9 months ago
- A simple BOF (Beacon Object File) to search files in the system☆12Updated last year
- A PoC tool for exploiting leaked process and thread handles☆30Updated 11 months ago
- ☆59Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆33Updated 3 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆38Updated last year
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆21Updated last year
- ☆26Updated 3 years ago
- ☆43Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆26Updated 2 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 8 months ago
- Get your data from the resource section manually, with no need for windows apis☆56Updated 3 months ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆48Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated last year
- ☆27Updated 6 months ago
- One gate to all syscalls!☆23Updated 2 years ago