hellofromdaniel / nyxpplLinks
Windows Protected Process Light toggle tool — dynamically finds offsets and patches EPROCESS using RTCore64
☆64Updated 9 months ago
Alternatives and similar repositories for nyxppl
Users that are interested in nyxppl are comparing it to the libraries listed below
Sorting:
- Section-based payload obfuscation technique for x64☆64Updated last year
- Shellcode Loader Utilizing ETW Events☆67Updated 11 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- ☆100Updated last year
- A process injection technique using only thread context manipulation☆40Updated 2 years ago
- Commandline spoofing on Windows☆92Updated 2 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆75Updated 6 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 5 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆129Updated 2 months ago
- ☆47Updated 2 years ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Updated last year
- EvtPsst☆55Updated 2 years ago
- ☆100Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Updated 2 years ago
- Mythic C2 Agent written in x64 PIC C☆84Updated last year
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆119Updated last month
- A more reliable way of resolving syscall numbers in Windows☆54Updated last year
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆33Updated last year
- API Hammering with C++20☆50Updated 3 years ago
- Proxy function calls through the thread pool with ease☆31Updated 11 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆84Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- ☆64Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Reports on Driver, LSASS and other security services mitigations☆34Updated 5 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Updated last year
- Sleep Obfuscation☆45Updated 3 years ago
- Things i do because i saw it on twitter on a weekend☆58Updated 6 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year