itaymigdal / PichichiH0ll0werLinks
Nim process hollowing loader
☆59Updated last month
Alternatives and similar repositories for PichichiH0ll0wer
Users that are interested in PichichiH0ll0wer are comparing it to the libraries listed below
Sorting:
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆65Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆68Updated last month
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆77Updated last year
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆120Updated last year
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆26Updated 4 months ago
- Unhook Ntdll.dll, Go & C++.☆27Updated 4 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 5 months ago
- ☆137Updated 2 years ago
- A process injection technique using only thread context manipulation☆37Updated last year
- Splitting and executing shellcode across multiple pages☆101Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- Linker for Beacon Object Files☆127Updated last month
- Bypass user-land hooks by syscall tampering via the Trap Flag☆98Updated this week
- ☆152Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated last year
- "Service-less" driver loading☆159Updated 9 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- A more reliable way of resolving syscall numbers in Windows☆53Updated last year
- Do some DLL SideLoading magic☆86Updated last year
- PoC XLL builder in Python/Nim☆47Updated 2 years ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated last year
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆120Updated last year
- ☆108Updated 10 months ago
- Your syscall factory☆124Updated 2 months ago
- Template-based generation of shellcode loaders☆79Updated last year
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆45Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆73Updated last month
- Section-based payload obfuscation technique for x64☆64Updated last year