huoji120 / sleep_duck_eyeLinks
Stack integrity verification to Detect SleepMask or CallStack Spoofer
☆39Updated 5 months ago
Alternatives and similar repositories for sleep_duck_eye
Users that are interested in sleep_duck_eye are comparing it to the libraries listed below
Sorting:
- shellcode生成框架☆89Updated last year
- An implementation of an indirect system call☆131Updated 2 years ago
- ☆16Updated 6 months ago
- vehsyscall:a syscall project that may bypass EDR☆60Updated last year
- Beacon compiled using clang☆72Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆66Updated 2 months ago
- 自定义函数堆栈,从而绕过ETW检测,这个是完整版。☆13Updated last year
- Self Cleanup in post-ex job☆59Updated last year
- A packer which adds encrypted shell to protect your PE file☆28Updated last year
- A C implementation for a stealth injection method☆36Updated 3 weeks ago
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆158Updated last year
- Windows Defender VDM lua collections☆48Updated 3 years ago
- ☆28Updated 2 years ago
- 简单安排一下 autochk.sys 这个rootkit☆74Updated 2 years ago
- 一个demo☆23Updated last year
- Code with Windows Hacker☆12Updated 3 years ago
- ☆43Updated 2 years ago
- Hide Port In Windows☆42Updated last year
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated 2 years ago
- Rust 重构的 sRDI☆17Updated last year
- 自用的shellcode生成框架☆32Updated 2 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆56Updated 2 years ago
- A BOF/COFF loader implemented in Go and CGO.☆22Updated last year
- IDA Python script for generating Windows x86 shellcode with one click☆40Updated 2 years ago
- can convert EXE/DLL into position-independent shellcode☆37Updated 3 months ago
- 使用kcp实现的socks5正向代理☆12Updated 2 years ago
- create schtasks bypass AV☆22Updated last year
- 针对windows rootkit的一些检测,分别从进程、端口、文件这三个方面进行检测。☆20Updated 11 months ago
- ☆21Updated 5 years ago
- ☆33Updated 2 years ago