ioncodes / SilentLoadLinks
"Service-less" driver loading
☆155Updated 6 months ago
Alternatives and similar repositories for SilentLoad
Users that are interested in SilentLoad are comparing it to the libraries listed below
Sorting:
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆130Updated 10 months ago
- ☆110Updated 5 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆115Updated 6 months ago
- ☆155Updated 6 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆112Updated 9 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 11 months ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆170Updated last week
- Injecting DLL into LSASS at boot☆118Updated last month
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆65Updated 2 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆82Updated 4 months ago
- ☆107Updated 7 months ago
- ForsHops☆53Updated 3 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 10 months ago
- TypeLib persistence technique☆115Updated 8 months ago
- A Mythic Agent written in PIC C.☆190Updated 4 months ago
- Shellcode loader☆86Updated 7 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Bypass LSA protection using the BYODLL technique☆164Updated 9 months ago
- A collection of position independent coding resources☆79Updated 4 months ago
- BOF with Synthetic Stackframe☆150Updated 4 months ago
- Sleep obfuscation☆228Updated 6 months ago
- shell code example☆49Updated last month
- Impersonate Tokens using only NTAPI functions☆75Updated 2 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 5 months ago
- Windows rootkit designed to work with BYOVD exploits☆200Updated 5 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆72Updated 7 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆161Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆110Updated last month
- ☆113Updated 5 months ago
- ☆136Updated 2 years ago