ghostpepper108 / Evasion
☆107Updated last year
Alternatives and similar repositories for Evasion:
Users that are interested in Evasion are comparing it to the libraries listed below
- Do some DLL SideLoading magic☆78Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆118Updated 7 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- ☆120Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- random code snippets, useful for getting started☆115Updated 3 months ago
- Create Anti-Copy DRM Malware☆52Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆61Updated 7 months ago
- Identify and exploit leaked handles for local privilege escalation.☆105Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated 11 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆71Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆135Updated 2 years ago
- ☆140Updated 2 months ago
- Find DLLs with RWX section☆76Updated last year
- ☆74Updated last year
- ☆134Updated last year
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆184Updated last year
- Just another C2 Redirector using CloudFlare.☆85Updated 9 months ago
- Windows Kernel Offensive Toolset☆119Updated 5 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆180Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆87Updated 7 months ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 9 months ago
- ☆147Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆78Updated last year
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 6 months ago