ghostpepper108 / Evasion
☆107Updated last year
Alternatives and similar repositories for Evasion:
Users that are interested in Evasion are comparing it to the libraries listed below
- Do some DLL SideLoading magic☆79Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Create Anti-Copy DRM Malware☆54Updated 7 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆99Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- Windows Kernel Offensive Toolset☆119Updated 6 months ago
- ☆149Updated 3 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆118Updated 8 months ago
- ☆120Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆138Updated 2 years ago
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- ☆136Updated 4 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 8 months ago
- Run Your Payload Without Running Your Payload☆180Updated 2 years ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆106Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Find DLLs with RWX section☆78Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 10 months ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆138Updated 2 weeks ago
- ☆114Updated last year
- POC for frustrating/defeating Malware Analysts☆154Updated 2 years ago
- Local & remote Windows DLL Proxying☆162Updated 9 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆86Updated last year
- ☆149Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆176Updated last year
- Splitting and executing shellcode across multiple pages☆100Updated last year
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year