frkngksl / UnlinkDLL
DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable
☆56Updated 9 months ago
Related projects: ⓘ
- ☆57Updated 9 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆72Updated last month
- miscellaneous codes☆35Updated 11 months ago
- VirusTotal Stealer is a DATA Exfiltration tool that exfitrate office documents and tunnel them over VirusTotal API to the Team Server☆62Updated 11 months ago
- A pure C version of SymProcAddress☆23Updated 6 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 2 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆20Updated this week
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆52Updated last month
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆43Updated 4 months ago
- Section-based payload obfuscation technique for x64☆59Updated last month
- A more reliable way of resolving syscall numbers in Windows☆49Updated 7 months ago
- ☆27Updated 3 months ago
- Windows Thread Pool Injection Havoc Implementation☆26Updated 5 months ago
- ☆47Updated last year
- EvtPsst☆53Updated 10 months ago
- ☆55Updated this week
- Just another Process Injection using Process Hollowing technique.☆16Updated last year
- Just another ntdll unhooking using Parun's Fart technique☆70Updated last year
- Red Team Operation's Defense Evasion Technique.☆50Updated 3 months ago
- ☆36Updated last year
- ☆33Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆36Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆42Updated 2 weeks ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆77Updated 7 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆32Updated 8 months ago
- DFSCoerce exe revisited version with custom authentication☆34Updated 8 months ago
- ☆27Updated this week
- Classic Process Injection with Memory Evasion Techniques implemantation☆64Updated 10 months ago
- Find DLLs with RWX section☆74Updated last year