☆32Jul 2, 2020Updated 5 years ago
Alternatives and similar repositories for ObfuscationStrings-new
Users that are interested in ObfuscationStrings-new are comparing it to the libraries listed below
Sorting:
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- This is a project to receive Base64 data and decode it in process☆15Mar 16, 2020Updated 5 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆13Jul 17, 2020Updated 5 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- ☆51Aug 28, 2021Updated 4 years ago
- Kernel mode to user mode injector☆11Mar 31, 2020Updated 5 years ago
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Jul 27, 2021Updated 4 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- ☆13Mar 27, 2020Updated 5 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Jun 11, 2015Updated 10 years ago
- External cheat base with DirectX overlay☆20Jul 25, 2018Updated 7 years ago
- Loads shellcode from a resource file.☆22Aug 15, 2019Updated 6 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆41Dec 31, 2020Updated 5 years ago
- Add or Delete User via windows api,it can be used when .net is inaccessible.☆39Feb 8, 2020Updated 6 years ago
- Defense Evasion & Bypass AntiVirus reference☆74Mar 28, 2021Updated 4 years ago
- 调用Windows Api,绕过杀软添加用户☆36Oct 8, 2020Updated 5 years ago
- ☆36Sep 7, 2020Updated 5 years ago
- DPX - the Doge Packer for eXecutables☆30Dec 21, 2021Updated 4 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 5 years ago
- base on winHttp to develep download☆12Apr 14, 2018Updated 7 years ago
- 隐藏可执行内存☆267Apr 27, 2025Updated 10 months ago
- simply manual map any system image☆18Feb 1, 2021Updated 5 years ago
- ☆17Apr 6, 2021Updated 4 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- 卓然主动防御源码(可执行文件+完整源码+完整作品报告)☆15Mar 5, 2019Updated 6 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- Iterate over Windows Handles☆15Nov 18, 2025Updated 3 months ago
- A flexible tool that creates a minidump of the LSASS process☆14Jan 18, 2022Updated 4 years ago
- ☆14Mar 8, 2019Updated 6 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆44Jun 23, 2022Updated 3 years ago
- 子域名清洗工具+awvs12联动xray分布式☆26Jun 18, 2020Updated 5 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago