itaymigdal / GetSystemLinks
Spawn SYSTEM shells like a PRO!
☆10Updated 2 years ago
Alternatives and similar repositories for GetSystem
Users that are interested in GetSystem are comparing it to the libraries listed below
Sorting:
- malware written for educational purposes☆70Updated last week
- Sleep obfuscation for shellcode implants and their reflective shit☆53Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆96Updated last year
- PoC XLL builder in Python/Nim☆49Updated 3 years ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Updated 5 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆120Updated last month
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 2 months ago
- Malware?☆76Updated 2 months ago
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- COM-based DLL Surrogate Injection☆140Updated last month
- Heap encryption in Nim☆20Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆79Updated 2 years ago
- Nim process hollowing loader☆62Updated 5 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆134Updated 4 months ago
- Poshito is a Windows C2 over Telegram☆17Updated last year
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆42Updated 9 months ago
- A collection of position independent coding resources☆105Updated last month
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆103Updated 10 months ago
- ☆52Updated last year
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆117Updated 2 weeks ago
- Sample Rust Hooking Engine☆36Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Updated last year
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆31Updated 2 years ago
- "Service-less" driver loading☆167Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆124Updated last month
- ForsHops☆59Updated 9 months ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆107Updated 2 months ago