☆32Jul 2, 2020Updated 5 years ago
Alternatives and similar repositories for ObfuscationStrings-new
Users that are interested in ObfuscationStrings-new are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a project to receive Base64 data and decode it in process☆15Mar 16, 2020Updated 6 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆13Jul 17, 2020Updated 5 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- ☆51Aug 28, 2021Updated 4 years ago
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- ☆13Mar 27, 2020Updated 5 years ago
- ☆21Apr 1, 2020Updated 5 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Jul 27, 2021Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆41Dec 31, 2020Updated 5 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 6 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- Loads shellcode from a resource file.☆22Aug 15, 2019Updated 6 years ago
- 调用Windows Api,绕过杀软添加用户☆36Oct 8, 2020Updated 5 years ago
- Compile-time string crypter library for C++☆14May 7, 2021Updated 4 years ago
- 这是一个直接取得系统权限的项目☆48Jun 24, 2020Updated 5 years ago
- ☆36Sep 7, 2020Updated 5 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- 优化了GetSystemEarlyBird的代码结构☆21Jun 24, 2020Updated 5 years ago
- Defense Evasion & Bypass AntiVirus reference☆74Mar 28, 2021Updated 4 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Jun 11, 2015Updated 10 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- vehsyscall:a syscall project that may bypass EDR☆63Mar 1, 2024Updated 2 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- CVE-2021-1675 (PrintNightmare)☆77Jul 5, 2021Updated 4 years ago
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆44Jun 23, 2022Updated 3 years ago
- 用于Dump指定进程的内存,主要利用静默退出机制(SilentProcessExit)和Windows API(MiniDumpW)实现☆25Dec 13, 2021Updated 4 years ago
- 隐藏可执行内存☆267Apr 27, 2025Updated 10 months ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- Kernel mode to user mode injector☆11Mar 31, 2020Updated 5 years ago
- Add or Delete User via windows api,it can be used when .net is inaccessible.☆39Feb 8, 2020Updated 6 years ago
- A simple program to obfuscate code written in cpp.☆51May 9, 2024Updated last year
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party ap…☆258Apr 19, 2021Updated 4 years ago
- DPX - the Doge Packer for eXecutables☆30Dec 21, 2021Updated 4 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆46Sep 16, 2021Updated 4 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago