itaymigdal / GetSystemLinks
Spawn SYSTEM shells like a PRO!
☆10Updated 2 years ago
Alternatives and similar repositories for GetSystem
Users that are interested in GetSystem are comparing it to the libraries listed below
Sorting:
- PoC XLL builder in Python/Nim☆47Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆94Updated 8 months ago
- Sleep obfuscation for shellcode implants and their reflective shit☆53Updated last year
- malware written for educational purposes☆66Updated 9 months ago
- Nim process hollowing loader☆59Updated last month
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆26Updated 4 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆67Updated last year
- Heap encryption in Nim☆19Updated last year
- Sample Rust Hooking Engine☆36Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆83Updated last month
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- shell code example☆62Updated 3 months ago
- ForsHops☆58Updated 5 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆60Updated 9 months ago
- Threadless shellcode injection tool☆67Updated last year
- ☆35Updated 4 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆68Updated 4 months ago
- One-header configurable C++20 COFF loader☆22Updated last month
- Poshito is a Windows C2 over Telegram☆14Updated 10 months ago
- A collection of position independent coding resources☆92Updated 6 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 8 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- Shellcode Loader Utilizing ETW Events☆65Updated 6 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆68Updated last month
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆61Updated last year
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆174Updated last week