itaymigdal / GetSystem
Spawn SYSTEM shells like a PRO!
☆11Updated 2 years ago
Alternatives and similar repositories for GetSystem:
Users that are interested in GetSystem are comparing it to the libraries listed below
- PoC XLL builder in Python/Nim☆46Updated 2 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆51Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆24Updated last month
- Nim process hollowing loader☆57Updated 9 months ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆27Updated last year
- malware written for educational purposes☆67Updated 5 months ago
- ☆48Updated last year
- Heap encryption in Nim☆19Updated 8 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- Proxy function calls through the thread pool with ease☆25Updated 2 months ago
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 9 months ago
- Unused DLL hollowing PoC in Nim☆17Updated 3 years ago
- ☆29Updated 4 months ago
- Windows Thread Pool Injection Havoc Implementation☆29Updated last year
- Threadless shellcode injection tool☆64Updated 9 months ago
- A pure C version of SymProcAddress☆27Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆76Updated 2 months ago
- Sample Rust Hooking Engine☆36Updated last year
- Section-based payload obfuscation technique for x64☆59Updated 9 months ago
- Rust template/library for implementing your own COFF loader☆50Updated 3 months ago
- Unhook Ntdll.dll, Go & C++.☆21Updated 2 weeks ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated last month
- A simple Nim stager (w/ fiber execution)☆17Updated 3 years ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆61Updated last week
- Shellcode Loader Utilizing ETW Events☆63Updated 2 months ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆35Updated last year
- ForsHops☆44Updated last month