frkngksl / UnlinkDLL
DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable
☆57Updated last year
Alternatives and similar repositories for UnlinkDLL:
Users that are interested in UnlinkDLL are comparing it to the libraries listed below
- ☆54Updated 5 months ago
- ☆48Updated last year
- ☆59Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- miscellaneous codes☆35Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆47Updated 11 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 8 months ago
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 8 months ago
- ☆34Updated 3 weeks ago
- A pure C version of SymProcAddress☆26Updated last year
- EvtPsst☆53Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- Red Team Operation's Defense Evasion Technique.☆53Updated 10 months ago
- BOF for C2 framework☆41Updated 5 months ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆24Updated 2 weeks ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- API Hammering with C++20☆46Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- in-process powershell runner for BRC4☆45Updated last year
- Find DLLs with RWX section☆79Updated last year
- Just another ntdll unhooking using Parun's Fart technique☆74Updated 2 years ago
- Sample Rust Hooking Engine☆36Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- Unhook Ntdll.dll, Go & C++.☆21Updated 9 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 4 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆24Updated 8 months ago