hellofromdaniel / nyxpplLinks
Windows Protected Process Light toggle tool — dynamically finds offsets and patches EPROCESS using RTCore64
☆58Updated 6 months ago
Alternatives and similar repositories for nyxppl
Users that are interested in nyxppl are comparing it to the libraries listed below
Sorting:
- Section-based payload obfuscation technique for x64☆64Updated last year
 - ☆94Updated last year
 - Shellcode Loader Utilizing ETW Events☆67Updated 8 months ago
 - ☆43Updated 10 months ago
 - Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆73Updated 3 months ago
 - Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
 - ☆82Updated 9 months ago
 - Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆68Updated last year
 - ☆61Updated last year
 - From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆50Updated last month
 - FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆30Updated 6 months ago
 - a demo module for the kaine agent to execute and inject assembly modules☆42Updated last year
 - Misery Loader to bypass modern EDR solutions☆16Updated 10 months ago
 - ☆100Updated 2 years ago
 - Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆102Updated 8 months ago
 - Reimplementation of the KExecDD DSE bypass technique.☆55Updated last year
 - DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆61Updated last year
 - A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆61Updated last year
 - Alternative Read and Write primitives using Rtl* functions the unintended way.☆76Updated 2 months ago
 - Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆77Updated last year
 - A process injection technique using only thread context manipulation☆39Updated last year
 - Sleep Obfuscation☆45Updated 3 years ago
 - ☆32Updated last year
 - Callstack spoofing using a VEH because VEH all the things.☆23Updated 7 months ago
 - An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 9 months ago
 - Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆129Updated 2 months ago
 - Exploiting the KsecDD Windows driver through Server Silos☆74Updated 11 months ago
 - A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆56Updated 6 months ago
 - Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
 - "Service-less" driver loading☆162Updated 11 months ago